Thursday, April 22, 2010

I feel it So Great Being A Filipino

y??

an educated person has sacrificed his life for me long been since i was not yet born into the earth.

I feel it so proud aside from his writings in noli me tangere and el felebusterismo. He has been a great martyr to his country and fellowmen.

I just learned his history and the story of his life this summer. He was not that what they say an emo trend(because of his hair style) in today's history but a noble to his country. He sticks on to his plan even if the things has not become so easy for him.

He was human, cries as being hurt like the common people. He despised himself, his pains and struggles for an aim.

He hopes and endures that he even think for the good of himself. He follow his heart's desire and pursue his goals.

i want to be like him because as i mirrored his life. his heroism touches me as if convincing me not to mind myself but to pursue on the things which i wanted to achieve. You are so great Doctor Jose Rizal.!!! I adore you...


Friday, February 26, 2010

Ethical Behavior With Regards to Computer Usage

Increase public knowledge about technology.

The ethics codes of the computer professional societies  was is an emphasis on the relationship and interaction of the computer professional with other people, rather than with machines.

One reason that the four codes are not only similar to each other, but also very similar to codes of non-computer professionals is that they take a generic approach to ethics. With the exception of the concern raised about privacy and the confidentiality of data, the codes could have been written to cover most professions and do not fully reflect the unique ethical problems raised by computer technology. Of the four codes, the ICCP code is most clearly geared to the computer profession and deserves further discussion.

it is heavily oriented toward an attempt to enforce standards of competence and accountability. For instance, the Preamble to the Code of Conduct confines its reach to “matters pertaining to personal actions of individual certified computer professionals in situations for which they can be held directly accountable without reasonable doubt (ICCP, p. 2),” Such language is subject to several interpretations and thus will keep lawyers in business for years. It then explains the obligations of certified computer professional under sections that appear to encourage or prohibit certain conduct in somewhat limited ways.

A person's moral and ethical values are critical to the relationships developed with fellow workers, the types of applications that are developed, the quality of the work done, and the general honesty and integrity of the person. Persons who have relative values will often see relationships with other persons as an avenue to further themselves. Their intellectual honesty is often open to question because using another person's property will be okay as long as it gets the job done and furthers that person's objectives. A person's values do make a difference in the character of a computer professional.

Honor property rights including the copyrights and patents.

Violation of copyrights, patents, and the terms of license agreements is prohibited by law in most circumstances. Even when not so protected, such violations are contrary to professional behavior. Copies of software should be made only with proper authorization. Unauthorized duplication of materials must not be condoned.

Unauthorized copying of software is illegal--copyright law protects authors and publishers of software.

The unauthorized copying of any software owned by the College will be viewed as an act of theft and a violation of the appropriate copyright protection provided for under the law.

The installation of any unauthorized software on any storage medium owned by the college, or the running of unauthorized software on computing equipment owned by the college will be viewed as a violation of the appropriate copyright protection provided for under the law for their junction/s.

 1.   Privacy -protect my privacy and respect the privacy of others.

2.    Property -property and respect the property of others.

3.    Appropriate Use- use technology in constructive ways and in ways which do not break the rules of my family, religion, school, or government.

Friday, February 5, 2010

Examples of the seven Cases od Deadlocks

1.Case 1:  Deadlocks on file requests

Two programs (P1, P2) and two files (F1, F2)

Deadlock sequence:

P1 has access to F1 and also requires F2

P2 has access to F2 and also requires F1


2.  Case 2: Deadlocks in databases

Transaction A might hold a lock on some rows in the Accounts table and needs to update some rows in the Orders table to finish. Transaction B holds locks on those very rows in the Orders table but needs to update the rows in the Accounts table held by Transaction A. Transaction A cannot complete its transaction because of the lock on Orders. Transaction B cannot complete its transaction because of the lock on Accounts. All activity comes to a halt and remains at a standstill forever unless the DBMS detects the deadlock and aborts one of the transactions.



3. Case 3:  Deadlocks in dedicated device allocation

Two programs (P1, P2)

Need two tape drives each
Only two tape drives in system
Deadlock sequence
P1 requests tape drive 1 and gets it
P2 requests tape drive 2 and gets it
P1 requests tape drive 2 but blocked
P2 requests tape drive 1 but blocked

4.  Case 4: Deadlocks in multiple device allocation

Three programs (P1, P2, P3)

Three dedicated devices (tape drive, printer, plotter)

Deadlock sequence

P1 requests and gets tape drive

P2 requests and gets printer

P3 requests and gets the plotter

P1 requests printer but blocked

P2 requests plotter but blocked

P3 requests tape drive but blocked


5. Case 5: Deadlocks in spooling

Printer needs all job output before printing begins

Spooling system fills disk space area

No one job has entire print output in spool area

Results in partially completed output for all jobs


6. Case 6: Deadlocks in disk sharing

Two processes

Each process waiting for I/O request

One at cylinder 20 and one at cylinder 310

Deadlock sequence

Neither I/O request satisfied

Device puts request on hold while attempting to fulfill other request for each request


7.  Case 7: Deadlocks in a network

Seven computers on network

Each on different node

Direction of arrows

Indicates message flow

Deadlock sequence

All available buffer space fills


Friday, January 15, 2010

 January 16, 2010

Compute the the average turnaround time of the following process scheduling algorithm.

 Arrival Time: 0 1 2 3 4 5 6 7 8 9 10

Job Name:A B C D E F G H I J K 

CPU Cycle: 5 2 8 4 3 1 2 9 7 3 4

a. First Come First Come First Serve Algorithm

JOB

A

JOB

B

JOB

JOB

D

JOB

D

JOB

E

JOB

F

JOB

G

JOB

H

JOB

I

JOB

K

0-5

7

15

19

27

23

25

34

41

44

48

ATT=(5+7+15+19+22+23+25+34+41+44+48)/11=25.73

b. Shortest Job Next

JOB

F

JOB

B

JOB

G

JOB

E

JOB

J          

JOB

D

JOB

K

JOB

A

JOB

I

JOB

C

JOB

H

0-1

3

5

8

11

15

19

24

31

39

48

ATT=(1+3+5+8+11+15+19+24+31+39+48)/11=18.55

c. Shortest Remaining Time

JOB

A

JOB

B

JOB

C

JOB

D

JOB

F

JOB

G

JOB

E

JOB

H

JOB

I

JOB

J

JOB

A

JOB

K

0-3

3

4

8

9

11

13

14

15

18

22

26

ATT=(22+2+2+5+9+5+40+24+9+16)/11=12.64

 d. Round Robin 

JOB

A

JOB

B

JOB

C

JOB

D

JOB

E

JOB

F

JOB

G

JOB

H

JOB

I

JOB

J

JOB

K

JOB

A

0-2

 4

 10

11 

13 

15 

17 

19 

21 

23 

JOB

J

JOB

K

JOB

A

JOB

C

JOB

H

JOB

I

JOB

C

JOB

H

JOB

I

JOB

H

 

 

33

35

36

38

40

42

44

46

47

48

 

 

 ATT=(36+34+42+24+6+7+41+39+24+25)/11=24.64