Search Engines, Our Internet friends


Search Engines.

Often want to enter to the Internet in search of any information specified and we don’t have any address of the pages they may offer it to us. No matter if you are looking for technical information, news, music, recipes, in order, as we usually say the frequent visitors of the Internet, everything is on the net!, and we have our friends: the Search Engines.




This claim is not an exaggeration, either for reasons of commercial, educational, institutional, or simply for the interest to publicize to the world a view, or the result of a job or hobby, etc., Internet, thanks to its popularity, has become the main means of communication of that information that mankind has.

web growth

For the current date, it is estimated more than 1100 million Web sites, although not all are active. At the same time, the number of users on the network, either as source of information, entertainment, etc., is estimated at more than 3200 million users.

Due to this enormous quantity of content, the only way to access the information that’s on the Web, when we don’t have a default address of the pages containing it, is through Search Engines.




Though all Search Engines have diversified by adding many other functions to their pages, its main function meet it through a box that allows you to place a text associated with which we want to locate.

Then the Search Engine would take as a reference to provide us a list of sites where we can find information linked to our search.

In general, this list includes fragments of Web sites where it was found the term searched, and in each one, a Link that gives access to that site.

While there are search engines specialized in search types specified (news, videos, tourism, etc.), the most widely used search engines are commonly used. The most important of these search engines, are:

  • Google
  • Bing
  • Yahoo

The difference, in terms of quality of the search, from one to another engine, is given by the relevance of each search engine gives to Web pages that contain the term to search for.

frogscomputer

Although it is matter of preference to use one or the other, Google is, by far, the most widely used, opinion personally I share.

Guardar

Guardar



Custom Search

Guardar

Guardar

Accessing a Website? Use Web Browsers!


Web Browsers.

The Web browsers are programs that we use to access Web sites that are on the Internet. Its main function is to “interpret” the content HTML (coding that transmitted the files of Web pages) and translate them into what we actually see on our computer screen. Most of them have the following characteristics:




  • Have a window called “of address or navigation” where is placed the address or name of the page you want to access.
  • They have a format of multiple “tabs” to be able to access some pages keeping others opened or accessed.
  • Allow to do impressions of the content of the page that we are displayed.
  • They allow doing a directory of Web sites that we mark as favorite or Favorites.
  • They define a Web page as home page, i.e., the initial page that we will connect to the network.

Software Hosting

Although there are some browsers that are capable of “search” Web pages with simplified identifications, the most usual is that we place, in the address box, the full generic name which is of the form:

http://www.nameofthepage.typeofdomain

As the reader can see, we have placed .typeofdomain and not the usual .com, what we have done to call attention to the term domain.




The domain under which a website is hosted is nothing more than the name, which must be unique, and is used as a term “manageable by humans” to find such website.

The adoption of names and extensions was made to replace the IP address due to the cumbersome for people, since it is composed of a series of up to 12 digits in groups of 3 separated by a dot (we will see later).

In the case of extensions, the intention was to identify the type of page according to its use. So that com corresponded to commercial, org institutional organizations, edu educational sites, etc.

Today, that classification is not a 100% reliable indicator since many domain names that the owners wanted to use, were already busy for an extension, so using your domain name with another than if it were available.

As the reader can guess, we want to clarify is that, except that the owner of the site has “bought” his domain with all extensions, the search with the web browsers of the site : http://www.dogs should most likely us directing to a page other than http://www.dogs.net.

domain

We also want to let you know that thanks to international agreements, and guidelines issued by the institutions to govern the operation of the Internet, there are also domain extensions with geographic allocation, which is in the end with two letters assigned to each country. For example VE to Venezuela, ES for Spain. UK for the United Kingdom, etc..

The international institutions that govern the operation of Internet with regard to domains, are the IANA (Internet Assigned Numbers Authority), and ICANN.

It is the Internet Corporation for assigned names and numbers of domains (Internet Corporation for Assigned Names and Numbers) which is a nonprofit that operates at level of assigning numerical address under the Internet Protocol (IP).

web browsers

To close the topic relative to browsers want to indicate that they are among the most important web browsers:

  • Internet Explorer
  • Chrome
  • Firefox
  • Safari
  • Opera



Custom Search

Guardar

Guardar

Internet. The Network of Networks.


Internet. What it is?

It is not a secret that most of the technologies developed by man, which we enjoy today, had its origins in the studies and research that many countries were at some point in the middle of the fight for military supremacy. Internet is no exception to this rule.




It all began in 1962, with a project sponsored by the United States Department of Defense in conjunction with the University of California, Los Angeles, in which was established the initial network of the project. It was baptized with the name of Arpanet (Advanced Research Projects Agency Network), i.e., the network of the Agency’s projects of advanced research.

arpanet

It was not until 1981 that one of the teams of the project initiation the term Internet, on the basis of the Interconnected Networks expression.

In 1989 the Arpanet project was replaced and liberate for commercial use the concept of interconnected networks that, with the birth in 1990 of the WWW or World Wide Web (global computer network), gave way to what we know today as the Internet:

A network that interconnects millions of networks around the world, and by which flow, in all senses, packets of Digital information with content that is interpreted and put into “readable” form by the browsers of all computers connected to this Network of Networks.

Internet. Network of networks

Once understood this very simplified history and definition of Internet, delving into its operation and its possibilities of use.

Software Hosting

Some terms that you should be familiar.

There are many expressions and acronyms that are commonly used in knowledgeable people in the middle and that at some point you could find when this “living” with the world of Internet, if it is that it is no longer so. Then place the most commonly used and their meaning:




Http: It is the abbreviation for Hypertext Transfer Protocol. It is not more than as agreed at the global level to make the transfer of information over the Internet. This communication standard is unique and its variant Https means that it is done in an environment with encryption which makes it more secure.

http

IP address: refers to the direction that has each computer connected to the Internet. Is formed by the term IP (stands for Internet Protocol) and a number of the form XXX.XXX.XXX.XXX, e.g.: IP 192.168.255.255. IP addresses are one for each user and only change when the networks are structured with dynamic addressing.

DSL: It is the abbreviation of Digital Suscriber Line and is used to identify one of the systems of access to most used Internet, which is through the same line that is used for phones.

DSL

URL: It is the abbreviation of Uniform Resource Locator and was named to the string that makes up a Web address. That is, the name that accessed the Web page.

www

WWW: It is the abbreviation for World Wide Web and define the environment in which the Network of Networks is handled: Internet.



Custom Search

Guardar

Guardar

The “Everything” Controllers. Operative Systems.


Operative Systems.

The answer about what are the Operative Systems, requires remember some concepts. So far we have spoken about components of any computer system and did a basic division whose components are the Hardware and Software.

We also saw the definitions and variety of both components and also did a tour of their functions in the system We also saw the definitions and variety of both components and also did a tour of their functions in the system.




Comes to see how the system works and for that we have to define what is an operative system and its important role in the interrelation:

operating systems , computing, networks, operative system

The operative system is a piece of Software that interact to all components of the Hardware (CPU and Input/Output devices) together with Software applications and both with the system user.

It is important to note that when we say “interact” we are talking about communicating and interpreting physical and virtual functions of operation and from the three components of the system.

In other words, we cannot speak of a computer system, without the presence of an operating system. Its most important functions are:

  • Structuring the file system to be used by the Software that is installed.
  • Accommodate all drivers programs for the input/output peripherals connected to your computer (drivers).
  • Serve as program of the boot of the system, and keep monitoring the performance of this.
  • Host a series of intrinsic system tools to solve the problems of compatibility between the installed Software and input/output peripherals.
  • Manage the system resources such as processor usage and management of the working memory and information storage systems.

Major classifications of Operative Systems.

They can be classified mainly depending on:

  • Number of users: multi-user or single-user
  • Number of tasks simultaneously: multi-tasking or single-tasking
  • Runtime: real time and deferred time.

Most  Relevant Operating Systems.

Over time many operative systems have been generated by different Software makers in partnerships with Hardware manufacturers, and most of them have tried to generate a market standard. Systems that have endured over time, are those who have achieved more support by developers of commercial Software..




According to different platforms, large groups that have endured over time are:

MS-Dos: It was the first standard in the market and practically captured the attention of manufacturers of Hardware and Software Developers of the age.

Windows: Since its first launch with Windows 3.1 up to the current Windows 10, including Windows NT network, this family of operative systems, thanks to its graphical user interface, has been the most popular of all operating systems.

Mac Os: In all its versions, and because the exclusivity in the popular brand Apple computers, has been one of the most widely used operative systems.

Unix: Including its free version: Linux, this operative system has continued to gain in popularity thanks to its versatility handling graphics, texts, and mathematical operations, in addition to its multi-tasking and multi-user ability.

And in the most recent mobile platforms include:

Android, the consent of Google. the IOS for mobile devices from Apple and to a lesser degree the Blackberry BBOS.

android operative systems

It is important to note that there are currently very few exclusive applications to one or another operative system, since most of the large companies in Software development, as well as a large number of independent developers, has worked on the adaptation of their programs to different operative systems.

Is it the developers of applications for mobile, those who have not renounced their diversification into all operating systems with their corresponding markets.

Even exist in the Software market, applications that simulate a (virtual) operating system, running from one platform with another installed.



Custom Search

Guardar

Guardar

Guardar

Guardar

Guardar

Guardar

Guardar

Guardar

Guardar

Guardar

Guardar

The Wearable Computers


Wearable Computers

Technological advancements of mankind have gradually acquired every aspect of contemporary life, at a speed such that they have not given us time to analyze in detail this technology. We continuously use devices routinely and not stopping to try to understand how they work, and how to get the most out of them. In fact, most of the times, we don’t perceive that we are treating with wearable Computers.

smartphonewatch

Through statistical studies obtained from a survey of people between 14 and 45 years of age, users of Smartphones, made for the 2nd half of 2015 by the Numbers Inc. Marketing company in three big Cities: New York, Los Angeles and Chicago, we got these revealing figures:

  • 39% change their smart phones before using fully the current, only to be “fashionable”.
  • Only 17% used productivity applications installed in their phones.
  • 31% acknowledged using their smart phone only for listening music.
  • 24% indicated not having opened several applications that brings their smartphone installed because not knowing how to use.




Other studies, as of the Cell Phones operator British O2 show little or no use of the functions of productivity of the smart phones, against its use in surfing Internet, social networking, music and games.

 

Smrtphone use

However, the objective of these reflections is none other than the highlight the importance that we learn to understand the capacity of our smart devices, small Computers, to take advantage of the tool, thoroughly.

Smart Phones.

The majority of these marvels of modern technology, are not more than small pocket computers with all the attributes of the case:

  • Central Unit of processing that hosts an operating system capable of even interacting with a table computer, network servers, printers, etc..
  • Devices of input/output such as touch screen, QWERTY keyboard incorporated the functions of touch screen. devices of voice recognition, inputs and outputs of Audio and Digital camera. Include too, satellite location system (GPS), non volatile storage with capacities of the order of the Gigabytes, interconnection capacity with Wi-Fi networks, Bluetooth, USB input/output port, and many other functions.
  • Software Library with thousands of titles, which include comprehensive productivity tools.

Smartphone

 

Finally, its small size should not be an element to ignore its potential.



Smart Watches.

Another application of computers for use by the man of today, are the smart watches, whose design and components do not lag behind with respect to smart phones.

These “little giants” are another powerful demonstration of what technology can achieve. It can include sensors (input elements) and the hardware and software required to detect pulse, accelerometer, calendar, camera, phone, calculator, GPS, Bluetooth connectivity and another large amount of features and applications that make it a technological marvel in miniature.

smartwatch

These devices, as all computer, have their own operating systems compatible with their large-scale counterparts. The most popular are Apple WatchIOS and AndroidWatchOS.



Custom Search

Guardar

Algorithms and Flow Diagrams for Computer Programming.


Computer Programming.

No matter which programming languages, software developers are planning to use, reasoning and sequencing of their work should be the same. Remember, their job is to make the computerrun a routine” to give to us, the users, the results we are looking for. Do this job, requires that the Developers use two important tools: the Formation of Algorithms and the Flow Diagrams.




Operation of a Program.

Now, consider the way in which a computer solves a problem.

  • Firstly, there must be a list of instructions written by the man to solve this problem, which we know under the name of program, and must be stored in the resident memory of the computer.
  • To the order of commencement of implementation of the program, the control unit is responsible to execute the instructions in the order determined by the program, by transferring the unit logic-arithmetic the execution of operations and comparisons, and receiving of the intermediate and final outcomes.
  • Once finished the process of calculations, the control unit proceeds to send these results to the units of output for use by the user. This procedure will be executed as many times as we tell it is the computer and always in the same way.

computer programming algorithms

We must always bear in mind the fact that the computer only does what the user ordered. This means that the mistakes that may exist in the results provided by the computer, are merely consequences of mistakes made in the program that is running or data entered by users.

The Formation of Algorithms.

As a general rule, there are three steps to be followed for the solution of a problem through the computer:

  1. Determine the problem we want to solve.
  2. Develop the finite model of the problem.
  3. Based on the finite model, get an algorithm.

The determination of problems not always is as easy as it might seem. Often the omission of this step has caused the loss of a large number of hours of work, for not having previously defined objectives wanting to achieve.

This work is usually set between the user and the programmer, and no other steps should get ahead without having previously concluded it.

The development of the finite model basically consists of the collection of all the elements involved in the variations of the problem (called variables), and determination of the mathematical or logical relationships among them.

Finally, programmer must analyze the obtained model and work on the formation of the algorithms. This term defines a series of instructions in a given sequence, necessary to describe the operations that lead to the solution of a problem.




Flow Diagrams.

An algorithm approach can be done in many ways, however, in computing is often used as graphics to be such as to allow a better visualization of the sequence in which instructions that make up this algorithm must be run.

Representation graph of  algorithms, known by the name of Flow Diagrams, and consists of a set of symbols that are connected to each other, representing the sequence and type of process to be held in each of the stages of solving a problem.

The symbols most commonly used to make a flowchart, are as follows:

DIAGRAMMING SYMBOLS

Then, we can see an example of very basic flowchart that defined an algorithm to make a machine to make separation and selection of two different coins and present a result on the number of coins by type.

FLOW DIAGRAM



Custom Search

Guardar

Guardar

Guardar

Networks, less complex than they look.


Something About Networks.

One of the most important qualities of modern personal computers is their ability to communicate among them. Hardware manufacturers and Software developers have worked preparing standards which allow such communication through Networks, which in turn has allowed that the exchange of information can be done quickly and in real time.

At the same time, the existence of networks facilitates doing working groups that have access to the same information simultaneously, major progress in their shared management can be.




In essence, the types of networks can be divided into two:

Networks User-User.

They are networks in which all computers connected to this network receive, process, store and send information in the same way. Such networks are normally used to “domestic” level.

From the point of view of the required Software, the Windows platform in all versions, from Windows 98, allows to establish a domestic network with shared resources.

Networks User-Server-User.

They are networks in which all kinds of interrelation between the equipment of users is done through a master computer called server from the network. Usually, the server sets the priority for communications between computers and tends to be used to store the information that you want to share.

NETWORKS SERVER

In small networks, the server can be one of the active computers as a user. When many users or much information or both are managed, is usually allocate a computer of higher performance and capacity for server function. For the management of this type of network, is often used on the server, an operating system specific to the management of networks. The best known is Windows NT (for Network).

A component called Hub or switch, where computers among them are physically linked is used in both types of networks, user-user or the server with all equipment.




Types of communication media for networks.

Communication between computers on a network can be made by one of the following means:

  • UFTP Copper Wire for Networks.

It uses a physical wiring from each computer to the Hub or switch. It allows very high speeds of communication and flow of information, and is relatively inexpensive. Since the connections are physical and ‘solid’ these networks are very reliable and secure.

  • Optical Fiber.

It is the most expensive means of communication, but the greater transmission capacity and with he obtained higher speeds of transmission of information. Like UFTP copper cable, it is very reliable and extremely secure. Their cost is high due to the sophisticated technology used.

Software Hosting

  • Wireless.

Wireless communication networks operate on the basis of signals of radio frequency between the computers that make up it and a special device that fulfills the function of encoder, decoder, receiver and the signal transmitter. This device receives the name of Access Point and usually carries a wired connection from the hub or network switch. There are commercial equipment that make both functions (access point and switch), although the most common is used two separate components.

This communication system is very versatile in terms of location and mobility, but does not offer the speed or reliability and security of wired networks. Is widely used in domestic networks and local networks of open access to public places and some shops and popularly is given the name of Wi-Fi (in its origin, for Wireless Fidelity).

wifi NETWORKS

Complementing the information concerning networks, we want to identify various commonly used terms that the reader will find if decide to delve into the topic.

  • LAN: Local Área Network.
  • WAN: Wide Área Network.
  • WLAN: Wireless Local Área Network.



Custom Search

Guardar

Guardar

Something about Programming Languages


Programming Languages.

There is a single programming language which any computer can really understand and run: his own native binary machine code. This is the lowest level of the language in which it is possible to write a program to communicate with a computer. All other programming languages are called from highest level or lower level in proportion to how much away or closer to the binary code of the machine.

Accordingly, the lowest level language corresponds completely to machine code, so a low level language instruction results in a single machine language instruction. However, a high level language instruction usually translates into several machine-language instructions.

Software HostingLow level languages have the advantage that can be written to take advantage of the peculiarities of the architecture of the central processing unit (CPU) which is the “brain” of any computer. So, a program written in a low level language can be very effective, making optimal use of the memory of the computer and processing time. However, writing a low-level program requires a considerable amount of time, as well as a very clear understanding of the inner workings of the microprocessor. Therefore, low level programming is typically used only for very small programs, or to segments of code that are very critical and must operate as efficiently as possible.

High level languages allow a development much more quickly of large programs. The final program executed by the computer is not as efficient, but the advantages of saving in time of the programmer usually outweigh the disadvantages of the inefficiencies of the program. This is because the cost of writing a program is nearly constant for each line of code, regardless of the language used. Thus, a high-level language where every line of code is equivalent to 10 machine-language instructions, slope only tenth part of what it would cost to set the 10 lines of code in machine language.




The first high-level programming languages were designed for specific kinds of tasks. Modern languages are most for general use. In any case, each language has its own characteristics, vocabulary and syntax. The most important are the following:

FORTRAN.

It was one of the first programming languages. FORTRAN (FORmula TRANslator acronym) was designed to handle mathematical operations, originally on mainframe computers. Although it was very efficient in mathematical calculations, FORTRAN was unable to handle any text and could hardly place titles and identifiers in their printed outputs.

programming-languagesdif

 

COBOL.

Its name is an acronym for COmmon Business Oriented Language. COBOL in its conception, is almost the opposite of FORTRAN. COBOL was designed to facilitate output written text-heavy in business data processing applications and using English to their output reports. It was conceived to handle textual data of business and its math abilities are restricted to little more than operations with money and percentages.

PASCAL

It owes its name to Blaise Pascal, philosopher and physicist French, and one of the fathers of the automation of the calculation. PASCAL was designed specifically as a teaching language. The purpose was to help the student to properly learn the techniques and requirements of structured programming. It was originally designed to be used on any platform. I.e., a PASCAL program could be compiled on any computer, and the result would run correctly on any other computer, even with a different or incompatible microprocessor type. The result was a language relatively slow, but work and fulfilled its mission while it was fashionable.

BASIC

Its name is the acronym for Beginner’s all-purpose Symbolic Instruction Code (all-purpose symbolic instruction code) and was the first interpreter language designed for general use. It was the programming language most used and today evolved as Visual Basic to work under Windows environment.

FORTH

It is a compiler and interpreter that was originally developed for the management of operations in real time and also allowing the user control it and make changes quickly. The name FORTH originated the concept of 4th generation language and had the restriction of only allowing file names of up to 5 characters.

C

Originated as A so-called experimental language that was then improved, corrected and expanded and was called B. This language at the same time was improved, updated, refined and eventually was called C. The C language has proved to be very versatile and surprisingly powerful. It is a very simple language and is nevertheless able to make large-scale developments. The operating system Unix, which has been adapted to a wide range of platforms and has continued to gain popularity, is written in language C.

C++

When the concept of objects and object-oriented programming development, C language standard had no internal structure to handle it. However, C was, and still is, very helpful so it has remained in use. Further development but a kind of extended C language that was originally called “C and somewhat” or C-plus (C +). Subsequently further they developed the concepts of Object Oriented Programing and C +, C ++ evolved in.

JAVA.

The constant search for a platform-independent language, gender the emergence of Java. This is the most recent language designed with that objective. Any computer with a Java runtime environment, can run a program written in this language, which makes it, so far, the Universal language par excellence.

One of the most useful aspects of Java is that web browsers are now designed to be able to incorporate small Java applications, or “applets” in Web pages. Other Java programs, called “servlets” run on Web servers. This allows additional communications between the page and the server and provides a high degree of interactivity and dynamic page generation.

The disadvantage of using the applets in this way is that they inherently run much more slowly than the programs developed in the computer.

JAVASCRIPT.

In most aspects, JavaScript is an interpreted version of Java. Its most common use is in Web pages, where it can be used to provide interactivity and dynamic response. Some Web servers may also make use of Javascript to generate dynamic pages.

PERL.

The Practical Extraction and Report Language, Perl, is very similar to the C language in many ways. However, it has a number of features that make it useful for a wide range of applications. The most popular use is Perl CGI programming (Computer Generated Imagery) or Generation Computer Imaging for Web application development. For example, generally, when you fill out and send a form via the Internet, most likely that this program written in Perl.

However, that is not the only use of PERL, because it is also an excellent programming language which allows the rapid development in a wide range of platforms.

 HTML.

The acronym stands for Hypertext Markup Language, made reference to the “markup language” for the preparation of Web pages. It is a standard that serves as a reference of the software that connects with the development of web pages in its different versions, defines a basic structure and one code (called HTML code) for the definition of the content of a web page, such as text, images, videos, games, among others.

There are also another large number of programming languages for application specific and of which only make mention, such as PHP, LISP, ADA, RUBY, Python and HASKELL.





Turning the machine languages on high level language.

Programming Languages we saw above, they are all considered High-Level Languages, and as we mentioned, Computers, as electrical equipment at end, only understand the basic language, the lowest level of zeros and ones, as representation of the passage or not the electric current by its millions of circuits.

binary

To convert the low level languages to high-level languages, there are tools to specific programming that they do the job. Let’s talk about them.

Assembly language.

Assembly language is not more than a symbolic representation of machine code, which also allows the symbolic designation of memory locations. Therefore, an instruction to add the contents of a memory location to an internal record of the CPU, called accumulator, might add a number instead of a string of binary digits (bits).

No matter how close this language to machine code assembler, the Computer still can not understand it. The Assembly language program must be translated into machine code by a program called assembler. The assembler program recognizes the strings that make up the symbolic names of the various operations of the machine and replaced the machine code required for each instruction.

At the same time, also calculates the desired direction, in memory, each symbolic name of this location, and replaces the addresses with the names. The end result is a program of machine-language that can operate by itself at any time.

When you reach that point, the Assembly and the Assembly language program are no longer necessary. To help distinguish between “before” and “after” versions of the program, the original assembly language program is also known as the source code, while the final machine-language program is designated the object code.

If a program of language assembler needs to be changed or corrected, it is necessary to make changes to the code source and reassemble it to create a program object.

Compiler Language.

Compiler language equivalent to the high level of Assembly language. Each instruction in the compiler language can correspond to many machine-language instructions. Once the program has been written, translates to a program called compiler equivalent machine code. Once the program is compiled, the resulting machine code is stored separately and can be run by itself at any time.

As is the case with Assembly language programs, update or correction of a compiled program requires that the original program or source, is modified appropriately and then compiled to form a new object or machine language program.

In general, the compiled machine code is less efficient than the produced code when using assembly language. This means that it works a bit slower and uses more memory than required for mounting the assembler program. To compensate this drawback we have the fact that it takes much less time to develop a program of compiler language, that required for an assembly language program.

Interpreter Language.

Interpreter language, like a compiler language, is considered high level. However, it works completely differently to the of these. Interpreter program resides in memory and run the program of high level without previously making the translation to machine code.

Using an interpreter program to directly run the user program has advantages and disadvantages. The main advantage is that you can run program to test its performance, make some changes and run again in a direct way. I.e., there is no need to recompile because there is never any new machine code. This greatly accelerates the development and testing process.

As a disadvantage, we have that this provision requires that both the interpreter and the users program reside in memory at the same time. In addition, since the interpreter has to only scan one line of the program of the user at the same time, and also run internal parts of itself in response, an interpreted program execution is much slower than a compiled program.



Custom Search

Guardar

Guardar

Numbering Systems. Binary, Hexadecimal


Numbering Systems.

Humans use as reference counting, a numbering system based on the number ten (10). This numbering system is known as the DECIMAL system, and has its origin in the use of the fingers of the hands as Assistant principal of count. For number greater than ten, the decimal system, although a little erratic at the beginning (eleven, twelve, etc.), regulates subsequently, with the use of consistent groups (twenty, twenty-one, thirty, thirty-one, and so…).




In the case of computers, such as electrical equipment for the purpose, the count is slightly different since limitations allow only can to distinguish States of a component such as a switch with its OFF and ON positions.

In this way, we have the conventional representation used for the interpretation of these conditions, is to use the number 0 to symbolize the condition of OFF, and the number 1 for the ON condition.

Numbering binary System

This system of numbering which based their principle in the use of two digits, we will call binary system, and from this moment we must accept it as the only way to “direct” communication that understands one computer either.

Let’s see now how it is carried out numerical interpretation, by a computer, using this elementary numbering system.

Software HostingWe had previously defined to the memory of the computer as a series of boxes composed of groups of BITS (eight in our case), and who called BYTES. Each of these BITS could take any one of the values 0 and 1, allowing us to get “words” like for example:

                                                00011001

From the point of view of the binary numbering system, this word is known as a “string of binary digits”, and corresponds to a value in the DECIMAL numbering system.

The correspondence in the decimal system, of any binary number, is obtained by applying the concept of numerical BASE. In general, for any numbering system, can be defined as BASE numeric number that gives origin to the beginning of the count. Thus, for the DECIMAL system we can talk about BASE 10, system binary will use BASE 2, etc.

For example, the decimal number 743 can be represented as:

(7X102) + (4X101) + (3X100)

= 700    +   40      +     3

= 743

Similarly, a binary number as represented by the string 00011001 can be carried to its decimal equivalent using the same principle:

(1X24) + (1X23) + (0X22) + (0X21) + (1X20)

= 16 +      8     +     0     +     0     +      1

= 25

As we can see, the binary systems and DECIMAL work similarly, except that the number of digits required to express any number, is greater in the event that we do so with binary digits. Indeed, if we had used decimal digits for the expression of number 25, we would have only had to use 2, while to express this issue using binary digits (11001) require 5.

Obviously, while the computers only understand and operate with binary numbers, its big advantage over human beings is the speed which perform enormous amounts of operations per second, still working with those long strings of zeros and ones that are so difficult to understand for us and much more, to memorize.

Because of this, man has devised different notation systems that contribute to an easier communication with computers. One of these systems is based on the use of the numbering system HEXADECIMAL, which consists of the use of the numerical base 16.

The following table shows the elements that make up the hexadecimal numbering system, as well as his correspondence with elements of the decimal and binary numbering systems .

HEX.                         DEC.                      BIN.

0……………………………..0……………………….0000

1……………………………..1……………………….0001

2……………………………..2……………………….0010

3……………………………..3……………………….0011

4……………………………..4……………………….0100

5……………………………..5……………………….0101

6……………………………..6……………………….0110

7……………………………..7……………………….0111

8……………………………..8……………………….1000

9……………………………..9……………………….1001

A……………………………..10………………………1010

B……………………………..11………………………1011

C……………………………..12………………………1100

D……………………………..13………………………1101

E……………………………..14………………………1110

F……………………………..15………………………1111

               TABLE 1




Here is an example of numerical representation in the case of the hexadecimal number 2F:

2F        =         (2X161) + (FX160)

=              32    +  (Fx1)

=           32    +    15

=          47 in decimal.

Number 47 decimal is represented as 101111 in binary, and is clear that the use of 2F is much easier to visualize and understand.

While it is true that through the use of hexadecimal numbering can either be directly understood by the computer, it is not less that operators can facilitate his work of conversion because of the peculiarity of the relationship between the two systems, which consists of the following:

  1. The base of the binary system is 2
  2. The base of the hexadecimal system is 16
  3. The fourth power of 2 is 16.

Together with the fact that a byte can be divided into two groups of 4 bits, and these groups to allow the application of the following rules:

  • To convert hexadecimal to binary, you have to convert each hexadecimal digit by the four corresponding bits in binary (see table 1).
  • To convert binary to hexadecimal, you should break the binary number into groups of four bits (from right to left) and then replace each of the groups by the corresponding hexadecimal digit.

In this way, and if we take into account that in our case we have as reference unit a byte (eight-bit group), we will have to “casually”, the greatest number in binary within the byte (11111111), coincides with the greatest number expressed by a number (FF) two-digit hexadecimal, it is 255, the greatest number possible expressed serious 1111111111111111 (16 numbers one) and this would be represented in hexadecimal as FFFF is not more than 65536.

As we can see, there is a curious relationship between these numbers that we wanted to illustrate. For example, when referring to the memory capacity of a computer, we had said that this average in kilobytes and its multiples, and that these were nothing more than a group of multiples of 1024 bytes. This indicates, that if we are talking about a computer with 64 K we are referring to a real capacity of 1024 X 64 = 65536 bytes…

All these “coincidences” have a logical explanation, but enter more deeply into such explanations, it would involve too much away from the objective of this website, so we leave them for a later opportunity.



Custom Search

Guardar

Guardar

What is the Software and how it Works?


Software… What it is?

Computers needs to work a series of instructions that we previously defined as programs, which could be their own system (hosted in the ROM memory), or the entered by the user (housed in RAM). All of these programs that define the logical operation of the system are known as SOFTWARE, and that tries to express the non tangible part of the system.




Computers, contrary to what many may think, and except in Artificial Intelligence applications, are unable to act on their own. Its way to solve problems or make decisions is only a reflection of the criterion having the person who prepares the programs that the computer is running. These programs are known as user programs, and are nothing more than instruction sets introduced the computer to run in an orderly fashion and in perfect sequence.

Data or job information are all that information generated by the user (or the program) that is used to perform the calculations or logical analysis.

Programs of the system are those who are responsible for coordinating the operation of the computer and are defined by the manufacturer through wired instructions, and hence permanent.

Software HostingThe internal memory of the computer is made up of two types of memory, memories of “read only” or type ROM (Read Only Memory), and memories of “random access” or RAM (Random Access Memory) type.

The ROM is the resident memory to accommodate the ongoing programmes of the system and are cannot be altered (usually) or deleted, although the computer is de-energized. These programs are so called firmware that is a software indelible hosted on the ROM.

The RAM is an area of memory for general use of the user where the information, be it data or programs, may be stored or retrieved when required. Originally, all memories were a volatile type, which meant that the contents of the RAM memory was lost whenever we de-energize the computer.

ram memory I

The emergence of the so-called non-volatile or permanent memories once again revolutionized the world of personal computers. Of course, also involved which might appear in portable computing devices, as well as more diverse media storage and digital information management.

Normally, the memory can be displayed as a group of boxes (also called locations), numbered 0 onwards. Number of location is known as “address” and has as a main characteristic being unique, and always the same, inside each computer. Each memory location stored a “word” which in turn is divided into BITS.

A BIT is defined as the basic unit of binary information, and can have only values 0 and 1. Its name is derived from the resulting contraction of thewords “BInary digiT”.

 

 

ROM

The number of bits that make up a “word” is based on the architecture of the microprocessor and although initially the standard was 8 bits. No much later, capabilities were growing at 16, 32, 64 bits, reaching nowadays sizes of up to 256 bits. For our discussion we will use a size of 8 bits receiving the name of “BYTE”.



Other term which we believe should clarify, are the widely used symbols “K”, “M”, “G” and “T” when referring to memory capabilities. These quantitative representations of the memory of a computer, are nothing more than the result of a partnership with the prefix “Kilo”, “Mega”, “Giga” and “Tera” of the metric system, used to represent groups of 1,000, 1,000,000 1,000,000,000 and 1,000,000,000,000 units.

In the event that we are using for the explanation, the prefix “Kilo” used in the term kilobyte, does not mean exactly 1000 bytes but 1024. This issue, as we will see later, is the result of raising the number 2 to the tenth power (2¹º). This means, that when we refer to the memory capacity of a computer using the term 16K, what we want to say is that this computer is able to store 16,384 “words” of eight Bits each, or what is the same, 16,384 bytes.



Custom Search

Guardar