Thursday, April 22, 2010
I feel it So Great Being A Filipino
an educated person has sacrificed his life for me long been since i was not yet born into the earth.
I feel it so proud aside from his writings in noli me tangere and el felebusterismo. He has been a great martyr to his country and fellowmen.
I just learned his history and the story of his life this summer. He was not that what they say an emo trend(because of his hair style) in today's history but a noble to his country. He sticks on to his plan even if the things has not become so easy for him.
He was human, cries as being hurt like the common people. He despised himself, his pains and struggles for an aim.
He hopes and endures that he even think for the good of himself. He follow his heart's desire and pursue his goals.
i want to be like him because as i mirrored his life. his heroism touches me as if convincing me not to mind myself but to pursue on the things which i wanted to achieve. You are so great Doctor Jose Rizal.!!! I adore you...
Friday, February 26, 2010
Ethical Behavior With Regards to Computer Usage
Increase public knowledge about technology.
The ethics codes of the computer professional societies was is an emphasis on the relationship and interaction of the computer professional with other people, rather than with machines.
One reason that the four codes are not only similar to each other, but also very similar to codes of non-computer professionals is that they take a generic approach to ethics. With the exception of the concern raised about privacy and the confidentiality of data, the codes could have been written to cover most professions and do not fully reflect the unique ethical problems raised by computer technology. Of the four codes, the ICCP code is most clearly geared to the computer profession and deserves further discussion.
it is heavily oriented toward an attempt to enforce standards of competence and accountability. For instance, the Preamble to the Code of Conduct confines its reach to “matters pertaining to personal actions of individual certified computer professionals in situations for which they can be held directly accountable without reasonable doubt (ICCP, p. 2),” Such language is subject to several interpretations and thus will keep lawyers in business for years. It then explains the obligations of certified computer professional under sections that appear to encourage or prohibit certain conduct in somewhat limited ways.
A person's moral and ethical values are critical to the relationships developed with fellow workers, the types of applications that are developed, the quality of the work done, and the general honesty and integrity of the person. Persons who have relative values will often see relationships with other persons as an avenue to further themselves. Their intellectual honesty is often open to question because using another person's property will be okay as long as it gets the job done and furthers that person's objectives. A person's values do make a difference in the character of a computer professional.
Honor property rights including the copyrights and patents.
Violation of copyrights, patents, and the terms of license agreements is prohibited by law in most circumstances. Even when not so protected, such violations are contrary to professional behavior. Copies of software should be made only with proper authorization. Unauthorized duplication of materials must not be condoned.
Unauthorized copying of software is illegal--copyright law protects authors and publishers of software.
The unauthorized copying of any software owned by the College will be viewed as an act of theft and a violation of the appropriate copyright protection provided for under the law.
The installation of any unauthorized software on any storage medium owned by the college, or the running of unauthorized software on computing equipment owned by the college will be viewed as a violation of the appropriate copyright protection provided for under the law for their junction/s.
1. Privacy -protect my privacy and respect the privacy of others.
2. Property -property and respect the property of others.
3. Appropriate Use- use technology in constructive ways and in ways which do not break the rules of my family, religion, school, or government.
Friday, February 5, 2010
Examples of the seven Cases od Deadlocks
Two programs (P1, P2) and two files (F1, F2)
Deadlock sequence:
•P1 has access to F1 and also requires F2
•P2 has access to F2 and also requires F1
2. Case 2: Deadlocks in databases
Transaction A might hold a lock on some rows in the Accounts table and needs to update some rows in the Orders table to finish. Transaction B holds locks on those very rows in the Orders table but needs to update the rows in the Accounts table held by Transaction A. Transaction A cannot complete its transaction because of the lock on Orders. Transaction B cannot complete its transaction because of the lock on Accounts. All activity comes to a halt and remains at a standstill forever unless the DBMS detects the deadlock and aborts one of the transactions.
3. Case 3: Deadlocks in dedicated device allocation
Two programs (P1, P2)
4. Case 4: Deadlocks in multiple device allocation
Three programs (P1, P2, P3)
Three dedicated devices (tape drive, printer, plotter)
Deadlock sequence
•P1 requests and gets tape drive
•P2 requests and gets printer
•P3 requests and gets the plotter
•P1 requests printer but blocked
•P2 requests plotter but blocked
•P3 requests tape drive but blocked
5. Case 5: Deadlocks in spooling
Printer needs all job output before printing begins
•Spooling system fills disk space area
•No one job has entire print output in spool area
•Results in partially completed output for all jobs
6. Case 6: Deadlocks in disk sharing
Two processes
–Each process waiting for I/O request
•One at cylinder 20 and one at cylinder 310
–Deadlock sequence
•Neither I/O request satisfied
•Device puts request on hold while attempting to fulfill other request for each request
7. Case 7: Deadlocks in a network
–Seven computers on network
•Each on different node
–Direction of arrows
•Indicates message flow
–Deadlock sequence
•All available buffer space fills
Friday, January 15, 2010
January 16, 2010
Compute the the average turnaround time of the following process scheduling algorithm.
Arrival Time: 0 1 2 3 4 5 6 7 8 9 10
Job Name:A B C D E F G H I J K
CPU Cycle: 5 2 8 4 3 1 2 9 7 3 4
a. First Come First Come First Serve Algorithm
JOB A | JOB B | JOB C | JOB D | JOB D | JOB E | JOB F | JOB G | JOB H | JOB I | JOB K |
0-5 | 7 | 15 | 19 | 27 | 23 | 25 | 34 | 41 | 44 | 48 |
ATT=(5+7+15+19+22+23+25+34+41+44+48)/11=25.73
b. Shortest Job Next
JOB F | JOB B | JOB G | JOB E | JOB J | JOB D | JOB K | JOB A | JOB I | JOB C | JOB H |
0-1 | 3 | 5 | 8 | 11 | 15 | 19 | 24 | 31 | 39 | 48 |
ATT=(1+3+5+8+11+15+19+24+31+39+48)/11=18.55
c. Shortest Remaining Time
JOB A | JOB B | JOB C | JOB D | JOB F | JOB G | JOB E | JOB H | JOB I | JOB J | JOB A | JOB K |
0-3 | 3 | 4 | 8 | 9 | 11 | 13 | 14 | 15 | 18 | 22 | 26 |
ATT=(22+2+2+5+9+5+40+24+9+16)/11=12.64
JOB A | JOB B | JOB C | JOB D | JOB E | JOB F | JOB G | JOB H | JOB I | JOB J | JOB K | JOB A |
0-2 | 4 | 6 | 8 | 10 | 11 | 13 | 15 | 17 | 19 | 21 | 23 |
JOB J | JOB K | JOB A | JOB C | JOB H | JOB I | JOB C | JOB H | JOB I | JOB H |
|
|
33 | 35 | 36 | 38 | 40 | 42 | 44 | 46 | 47 | 48 |
|
|