Principles of Information Systems, Thirteenth Edition Chapter 1 PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Document Details

DelightedVeena

Uploaded by DelightedVeena

King Saud University

Tags

information systems business information systems data management computer science

Summary

This document provides an introduction to information systems, focusing on the differences between data, information, and knowledge, and explains the importance of quality data. It also highlights the components and functions within an information system, along with various types of business information systems.

Full Transcript

Principles of Information Systems, Thirteenth Edition Chapter 1 An Introduction to Information Systems 1 Objectives After completing this chapter, you will be able to: 1. Distinguish data from information and knowle...

Principles of Information Systems, Thirteenth Edition Chapter 1 An Introduction to Information Systems 1 Objectives After completing this chapter, you will be able to: 1. Distinguish data from information and knowledge, and describe the characteristics of quality data 2. Identify the fundamental components of an information system and describe their function 3. Identify the basic types of business information systems Data, Information, and Knowledge Exploring the distinctions between them in the world of sales: Data Raw sales transactions Example: individual sales transactions recorded on a specific date Data lacks context and interpretation Information Organizing and processing raw sales data so that it has additional value beyond the value of the individual facts Example: aggregating daily sales to calculate weekly and monthly totals Information reveals visible trends in sales patterns Knowledge: Integrating various sales information Example: analyzing historical sales data to identify seasonal trends, considering external factors like promotions and economic conditions Knowledge allows for a deeper understanding of trends, beyond surface-level insights 3 Data, Information, and Knowledge 4 The Value and Quality of Information Valuable information helps people perform tasks more efficiently and effectively Inaccurate data can result in loss of potential new customers and reduced customer satisfaction If an organization’s information is not accurate or complete: People can make poor decisions, costing thousands, or even millions, of dollars Depending on the type of data you need: Some characteristics become more important than others For example, accuracy and completeness are critical for data used in accounting for the management of company assets 5 Characteristics of Quality Information 6 What is an Information System? An information system (IS) is a set of interrelated elements that: Collect (input) Process Store Disseminate data and information Provides a feedback mechanism to monitor and control its operation to make sure it continues to meet its goals and objectives 7 Types of Feedback: 1) User Feedback A system can collect feedback from users regarding their experience, satisfaction, and suggestions for improvement This can be done through surveys, user feedback forms, or online reviews User feedback helps identify usability issues, functionality gaps, or areas where the system can be enhanced to better meet user needs 8 Types of Feedback: 2) Error Reporting When errors or exceptions occur within the system, a feedback mechanism can be in place to capture and report them This feedback helps identify the root causes of errors, troubleshoot issues, and implement corrective actions to prevent future occurrences Source: https://carldesouza.com/turning-off-dynamics-365-error-report/ 9 What is an Information System? A computer-based information system (CBIS) is a single set of hardware, software, databases, networks, people, and procedures 10 People Good systems can boost job satisfaction and worker productivity Information systems personnel include all the people who manage, run, program, and maintain the system 11 Procedures Procedure defines the steps to achieve a specific end result, such as Enter a customer order Pay a supplier invoice When using a CBIS, it’s important to follow procedures for operating, maintaining, and securing the system 12 Procedures: More examples User authentication procedure: outlines the steps for users to log in securely to the system. It may include instructions on providing usernames, passwords, and any additional authentication factors Data backup procedure: defines the process of regularly creating backup copies of data stored in the CBIS. It may include details on selecting backup media, and verifying the integrity of backed-up data Data retention procedure: specifies the guidelines for retaining and disposing of data within the CBIS. It may include the duration of data retention based on legal, or business needs 13 Information Systems in Organizations To ensure the successful implementation and utilization of information systems, organizations should focus on: Well-trained workers System support Better teamwork Redesigned processes New decision rights 14 Redesigned Processes (Reengineering) vs Continuous Improvement Reengineering Also called Business Process Reengineering (BPR) Involves the radical redesign of business processes, organizational structures, and information systems to achieve a breakthrough in business results ”‫خالد الغنيم يروي حكاية أول تعاون لشركة "علم" مع "الجوازات‬.‫د‬ - https://twitter.com/i/status/1642286268598853633 Continuous improvement Constantly seeking ways to improve business processes and add value to products and services 15 16 Reengineering and Continuous Improvement © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 16 or otherwise on a password-protected website for classroom use. 17 Reengineering and Continuous Improvement © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 17 or otherwise on a password-protected website for classroom use. Business Information Systems Information systems are used in all functional areas of business organization, such as: Accounting and finance Customer service Human resources Manufacturing Research and development Sales and marketing 18 Business Information Systems Information systems are also used in nearly every industry, such as: Agriculture Finance Health care Mining Professional services Retail 19 Types of Information Systems This lecture will cover various types of information systems: Transaction Processing Systems (TPS) Management Information Systems (MIS) ERP Systems Knowledge Management Systems (KMS) Other types Decision Support Systems (DSS) Geographic Information Systems (GIS) Learning Management Systems (LMS) - Which can be considered as a type of KMS 20 1) Transaction processing system (TPS) Transaction Any business-related exchange, such as payments to employees and suppliers and sales to customers Transaction processing system (TPS) An organized collection of people, procedures, software, databases, and devices Used to perform and record completed business transactions Example: Point-of-Sale (POS) System in a retail store that records sales transactions, updates inventory levels, and processes customer payments 21 2) Management Information Systems (MIS) Management information system (MIS) Organized collection of people, procedures, software, databases, and devices Provides routine information to managers and decision makers Focuses on operational efficiency Provides standard reports generated with data and information from the TPS Example: Sales dashboard that provides visualized data on sales performance, customer demographics, and product trends, aiding managers in informed decision- making 22 3) ERP Systems Enterprise resource planning (ERP) A set of integrated programs/modules - Human resource management - Customer relationship management (CRM) - Financial management - Warehouse management - And more Manages the vital business operations for the entire organization 23 4) Knowledge Management Systems Knowledge management systems (KMSs) An organized collection of people, procedures, software, databases, and devices that: - Stores and retrieves knowledge - Improves collaboration Examples: - Customer support: provide agents/employees with a knowledge base (‫ )قاعدة معرفة‬to resolve customer issues quickly and effectively - Product development: share best practices, lessons learned, and technical expertise across teams to accelerate innovation - Document management with SharePoint 24 Electronic Commerce E-commerce involves the exchange of money for goods and services over electronic networks Forms of e-commerce: Business-to-Business (B2B) - Alibaba, Sary Business-to-Consumer (B2C) - Amazon, NiceOne, and Floward Consumer-to-Consumer (C2C) - eBay, etsy, and Soum Government-to-Citizen (G2C) Government-to-Business (G2B) Government-to-Government (G2G) 25 Electronic Commerce Many organizations use both: Buy-side e-commerce to purchase goods and services from suppliers Sell-side e-commerce to sell products to their customers Successful e-commerce solutions are designed to be highly scalable Can be upgraded to meet unexpected user traffic Key decision for a new e-commerce company Deciding between hosting its own website or utilizing a third-party web service provider, such as Salla or Zid 26 Summary The value of information is directly linked to how it helps decision makers achieve the organization’s goals Information systems are composed of fundamental components that must be carefully assembled and integrated to work well together Organizations employ a variety of information systems to improve the way they conduct business and make fact-based decisions 27 Principles of Information Systems, Thirteenth Edition Chapter 3 Hardware © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain 1 product or service or otherwise on a password-protected website for classroom use. Objectives After completing this chapter, you will be able to: 1. Identify and briefly describe the functions of the primary components of a computer 2. Give an example of recent innovations in computer processor chips, memory devices, and input/output devices 3. Identify the characteristics of various classes of single-user and multiuser computer system, and discuss the usage of each class of system 4. Identify some of the challenges and trade-offs that must be considered in implementing a data center © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Anatomy of a Computer Hardware components include devices that perform: Input Processing Data storage Output © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 3 or otherwise on a password-protected website for classroom use. Anatomy of a Computer Central Processing Unit (CPU) is the part of the computer that sequences and executes instructions. The CPU consists of: Arithmetic/logic unit (ALU) - Performs addition, subtraction, multiplication, division, and logical comparisons The control unit - Decodes instructions, and coordinates the operations of other CPU components The register areas - Small, high-speed storage areas within the CPU Memory Provides the processor with a working storage area to hold program instructions and data Input/output devices Provide data and instructions to the computer and receives results from it Including permanent storage © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 4 or otherwise on a password-protected website for classroom use. Processor Completing an instruction involves four steps The four steps © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 5 or otherwise on a password-protected website for classroom use. Processor Decoding involves breaking down the instruction into two parts: opcode (operation code) and address code Opcodes are a basic set of commands that the processor can execute, such as ADD—Add two numbers together COMPARE—Compare numbers IN—Input information from a device (e.g., keyboard) JUMP—Jump to designated memory address © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 6 or otherwise on a password-protected website for classroom use. How decoding works? An example Source: The Crash Course Computer Science https://youtu.be/FZGugFqdr60?si=5SJfqxbLBOTMfUdL&t=95 1:35 to 4:18 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 7 or otherwise on a password-protected website for classroom use. How decoding works? An example Source: The Crash Course Computer Science https://youtu.be/FZGugFqdr60?si=5SJfqxbLBOTMfUdL&t=95 1:35 to 4:18 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 8 or otherwise on a password-protected website for classroom use. How decoding works? An example Source: The Crash Course Computer Science https://youtu.be/FZGugFqdr60?si=5SJfqxbLBOTMfUdL&t=95 1:35 to 4:18 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 9 or otherwise on a password-protected website for classroom use. How decoding works? An example Source: The Crash Course Computer Science https://youtu.be/FZGugFqdr60?si=5SJfqxbLBOTMfUdL&t=95 1:35 to 4:18 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 10 or otherwise on a password-protected website for classroom use. How decoding works? An example Source: The Crash Course Computer Science https://youtu.be/FZGugFqdr60?si=5SJfqxbLBOTMfUdL&t=95 1:35 to 4:18 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 11 or otherwise on a password-protected website for classroom use. How decoding works? An example Source: The Crash Course Computer Science https://youtu.be/FZGugFqdr60?si=5SJfqxbLBOTMfUdL&t=95 1:35 to 4:18 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 12 or otherwise on a password-protected website for classroom use. How decoding works? An example The control unit decodes instructions by generating signals to coordinate operations Source: The Crash Course Computer Science https://youtu.be/FZGugFqdr60?si=5SJfqxbLBOTMfUdL&t=95 1:35 to 4:18 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 13 or otherwise on a password-protected website for classroom use. Processor Clock speed Often measured in gigahertz (GHz): billions of cycles per second Many of today’s computers operate in the 1 to 4 GHz range © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 14 or otherwise on a password-protected website for classroom use. Processor Architectures x86 Mostly used in desktop computers Main manufacturers: Intel and AMD ARM Mostly used in mobile devices due to energy efficiency ARM is a designer of computer processors; it licenses its designs to chip manufacturers Examples: Qualcomm Snapdragon and Apple M1 are based on ARM Other architectures exist © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 15 or otherwise on a password-protected website for classroom use. Processor Families A set of processors from the same manufacturer that have similar features and capabilities Examples: Intel families: Atom, Celeron, Pentium, Core, Xeon © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 16 or otherwise on a password-protected website for classroom use. Utilizing Multiple Processing Units Coprocessor Executes specific types of instructions while the CPU works on another processing activity Examples: - Graphics Processing Unit (GPU) executes specific types of instructions while the other processer (the CPU) works on another processing activity - Apple Neural Engine (ANE) executes deep neural networks on Apple devices while the other processor executes all other tasks Multicore processor Multicore processor has two or more independent processing units, called cores These cores can run multiple instructions at the same time, thereby increasing the amount of processing that can be completed in a given amount of time CPUs can have up to 20 cores GPUs can have 100s or even thousands of cores © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 17 or otherwise on a password-protected website for classroom use. Parallel computing The simultaneous execution of the same task on multiple processors Massively parallel processing systems Systems with thousands of such processors Control Processor Processor 1 Processor 2 Processor 3 Processor 4 Memory Memory Memory Memory Results combined © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 18 or otherwise on a password-protected website for classroom use. Grid Computing The use of a collection of computers, often owned by multiple individuals or organizations, that work in a coordinated manner to solve a common problem Examples⁺: The Large Hadron Collider (LHC): 170 computing centers from 42 countries Volunteer computing: IBM World Community Grid app [video] © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 19 or otherwise on a password-protected website for classroom use. Main Memory Provides the CPU with a working storage area for programs and data Rapidly provides data and instructions to the CPU Also known as Random Access Memory (RAM) RAM is temporary and volatile Storage capacity Byte (B): eight bits that together represent a single character of data © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 20 or otherwise on a password-protected website for classroom use. Cache Memory Processor can access this type of high-speed memory faster than main memory Located on or near the CPU chip © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 21 or otherwise on a password-protected website for classroom use. Types of Memory © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 22 or otherwise on a password-protected website for classroom use. Read-Only Memory (ROM) It’s nonvolatile, which means it provides permanent storage for data and instructions ROM chips store the essential programming required to start up a computer ROM chips were also used in gaming system cartridges (e.g., Gameboy) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 23 or otherwise on a password-protected website for classroom use. Secondary Data Storage Devices Secondary storage Devices that store large amounts of data and programs more permanently than allowed with memory Advantages over memory Nonvolatility Greater capacity Cheaper Secondary storage is not directly accessible by the CPU Computers usually use input/output channels to access secondary storage and then transfer the desired data to intermediate areas in primary storage Most common forms Magnetic, such as hard disk drives Optical, such as CD, DVD and Blu-ray discs Solid state, such as solid state drives (SSD) and USB memory sticks © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 24 or otherwise on a password-protected website for classroom use. Magnetic Secondary Storage Devices Magnetic tape A type of sequential secondary storage medium Primarily for storing backups and archives. Why? - Cost: the cost per gigabyte for magnetic tapes is considerably lower - Longevity: under the right condition, the lifespan of tapes range between 10 to 20 years Photo: Victor Prado © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 25 or otherwise on a password-protected website for classroom use. Magnetic Secondary Storage Devices Hard disk drive (HDD) A storage device that consists of rapidly rotating disks coated with magnetic material How HDDs work? [link] © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 26 or otherwise on a password-protected website for classroom use. Magnetic Secondary Storage Devices Redundant array of independent/inexpensive disks (RAID): a technology that allows multiple hard disks to be combined into a single logical unit The main goal of RAID is to increase reliability and data availability Except for RAID 0 where the goal is to improve performance RAID 0 Data is spread across multiple disks Advantage: Speed Disadvantage: No fault tolerance © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 27 or otherwise on a password-protected website for classroom use. Magnetic Secondary Storage Devices RAID 1: disk mirroring Data is mirrored across two disks, so that if one disk fails, the data can still be accessed from the other disk Advantage: Fault tolerance Disadvantage: Using RAID 1 requires double the disk space Other RAID types: RAID 5, and RAID 10, etc © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 28 or otherwise on a password-protected website for classroom use. Optical Secondary Storage Devices A form of data storage that uses lasers to read and write data Common types of optical storage devices Compact disc read-only memory (CD-ROM) Digital video disc (DVD) Blu-ray high-definition video disk © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 29 or otherwise on a password-protected website for classroom use. Solid State Secondary Storage Devices Solid state storage device (SSD) Stores data in memory chips rather than magnetic or optical media Advantages Require less power and provide faster access than magnetic data storage devices Have no moving parts, so they are less fragile than hard disk drives A USB flash drive is a common SSD © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 30 or otherwise on a password-protected website for classroom use. Enterprise Storage Options 1. Attached storage A storage device that is directly connected to a single computer or server It’s typically used for local storage of files and applications 2. Network-attached storage (NAS) A storage device (or a storage server) that is directly connected to a network Each NAS consists of one or several hard disk drives and has its own network address It can be a good option for small businesses and home users © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 31 or otherwise on a password-protected website for classroom use. Enterprise Storage Options 3. Storage Area Networks (SAN) A high-performance network that is dedicated to storage SANs are typically used by large businesses and enterprises that need high availability and scalability 4. Storage as a Service (Cloud Storage) Storage that is hosted remotely and accessed over the internet - The data storage service provider rents space to individuals and organizations Cloud storage is a convenient and scalable option for businesses of all sizes Cloud-based storage services - For consumers: Apple iCloud, Dropbox, Google Drive, and Microsoft OneDrive - For enterprises: Amazon’s Simple Storage Service (Amazon S3) allows subscribers to upload, store, and download data © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 32 or otherwise on a password-protected website for classroom use. Input and Output Devices Input and output devices: Allow the user to provide data and instructions to the computer and to receive results from it Are part of a computer’s user interface Organizations should keep their business goals in mind when selecting input and output devices Specialized functions may be required © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 33 or otherwise on a password-protected website for classroom use. Input Devices Common Personal Computer Input Devices Keyboard and mouse Motion-Sensing Input Devices Scanning Devices Magnetic Ink Character Recognition (MICR) Devices © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 34 or otherwise on a password-protected website for classroom use. Input Devices Card Readers: Magnetic Stripe Cards Chip Cards Contactless Payment Cards Bar-Code Scanners Radio Frequency Identification (RFID) Devices Pen Input Devices Touch Screens Biometric Devices Iris Scanner Fingerprint Scanner Heart-Rate Monitor © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 35 or otherwise on a password-protected website for classroom use. Output Devices Display Screens Used to show output from the computer Two main types of flat displays: LCD (Liquid Crystal Display) and LED LCD [link] - Uses a backlight source - LCD originally used fluorescent backlights but now transitioned to energy-efficient LEDs, known as LED LCD displays or simply as LCD displays - Advantages over OLED: brightness, cost, and durability OLED (Organic Light Emitting Diode) - No backlight - Each pixel emits (produces) light independently - OLED enables improved contrast and lower power consumption than LCD and LED LCD Why? Black in OLED is actually black - OLEDs are thinner and lighter © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 36 or otherwise on a password-protected website for classroom use. Output Devices E-Ink displays in e-book readers E-book readers are equipped with E-Ink (Electronic Ink) displays, which are famous for their their excellent readability even in sunlight, minimal power consumption, and reduced eye strain An electronic book (e-book) is designed to mimic the appearance of printed text on paper while offering benefits like portability and adjustable text size © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 37 or otherwise on a password-protected website for classroom use. Output Devices Printers and Plotters Two main types of printers - Laser - Inkjet Plotters - They’re used for general design work such as posters and drawings of buildings © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 38 or otherwise on a password-protected website for classroom use. Output Devices 3D Printers Unlike traditional printers that use document files (e.g., docx and pdf), the 3D printer works with three-dimensional models (a computer file) to create objects Key advantages: - Prototyping - Customization: https://youtu.be/GGbEFn2w8Pg?t=24 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 39 or otherwise on a password-protected website for classroom use. Multimedia Technologies Haptic Technology Virtual Reality Augmented Reality © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 40 or otherwise on a password-protected website for classroom use. Haptic Technology Haptic technology, also known as haptics, involves the simulation of touch sensations to enhance user interactions with digital devices By replicating tactile sensations, haptic technology adds a new dimension to user interfaces, making them more intuitive and engaging Demo: https://www.youtube.com/watch?v=uPnHzQ7qJ2Y Applications: In smartphones Haptic feedback in VR gloves In gaming controllers: PS5 DualSense - https://www.youtube.com/watch?v=ODe4GtbeK44 © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 41 or otherwise on a password-protected website for classroom use. Virtual Reality (VR) A technology that creates a computer-generated environment, simulating a 3D world and blocking out the physical surroundings Users typically wear VR headsets and other devices (such as gloves and vests) to experience and interact with this digital environment Applications: Gaming Education Military training © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 42 or otherwise on a password-protected website for classroom use. Augmented Reality (AR) AR overlays digital content onto the real world, enhancing the user's environment by providing contextually relevant information Examples⁺: Snapchat filters IKEA Place Pokémon GO New employee training [video] IKEA Place Pokémon GO © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 43 or otherwise on a password-protected website for classroom use. Computer System Types Single-user computers Portable computers - Wearable computers such as health tracking wrist bands and smart watches - Smartphones - Laptops - Tablets Nonportable (stationary) computers - Desktop computers Multiple-user computers Servers Mainframes Supercomputers © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 44 or otherwise on a password-protected website for classroom use. Computer System Types General-purpose computers Desktops, laptops, and servers Special-purpose computers Computers used in POS systems Computers in medical imaging devices Computers in aircrafts and automobiles Automotive diagnostic computers ATMs (Automated Teller Machines) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 45 or otherwise on a password-protected website for classroom use. Thin Clients Computing devices (either stationary or portable) that rely on a central server for most of their processing and storage needs Key characteristics Minimal local processing and storage Network Dependence Centralized management Examples⁺: A hospital might use thin clients in patient rooms to access electronic health records stored on a central server https://www.youtube.com/watch?v=FbC0iwjrsC8 Kiosks: https://aflak.com.sa/en/saudi/retail/kiosks © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 46 or otherwise on a password-protected website for classroom use. Servers Computers employed by many users to perform a specific task/service Web server Designed to deliver web content DNS server (Domain Name System) Converts human-readable domain names (e.g., www.google.com) into machine- readable IP addresses (e.g., 142.250.189.174) IP addresses are used by computers to locate each other on the internet Mail server Responsible for sending, receiving, and storing email messages File server Responsible for storing, managing, and sharing files and data with networked clients © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 47 or otherwise on a password-protected website for classroom use. Servers Tower server: A standalone server unit that resembles traditional desktop computer towers Rack server: A standard servers designed to be mounted in a standard server rack Source: https://community.fs.com/blog/server-types-rack-server-vs-blade-server-vs-tower-server.html © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 48 or otherwise on a password-protected website for classroom use. Mainframes Mainframe computer: a large, powerful computer (server) designed to process a large number of transactions at the same time while ensuring a high level of reliability Key advantages: Reliability: mainframes are engineered for minimal downtime Mainframes can handle a large number of transactions at a single time - Example: credit card transactions © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 49 or otherwise on a password-protected website for classroom use. Mainframes⁺ IBM is a leading mainframe manufacturer IBM z13 mainframe is capable of processing 2.5 billion transactions per day Pricing for the IBM z15 depends on configuration and can cost as high as $4 million Z stands for zero downtime Applications: Processing payroll for millions of employees at over 610,000 companies UPS, which tracks the route of 18 million packages each day in 200 countries © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 50 or otherwise on a password-protected website for classroom use. Supercomputers One of the most powerful computer systems with the fastest processing speed Supercomputers, like those used by weather forecasters and in AI research, perform complex calculations quickly, aiding weather prediction and advancing AI technologies Most new supercomputers employ GPU chips in addition to CPU chips Examples⁺: Aramco’s Dammam-7: to image geophysical resources and to enhance assessments of oil and gas reserves NVIDIA DGX: for deep learning (AI) applications © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 51 or otherwise on a password-protected website for classroom use. Supercomputers⁺ © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 52 or otherwise on a password-protected website for classroom use. Supercomputers⁺ As of April 2023, Frontier is the world's fastest supercomputer, becoming the world’ f r t exascale supercomputer. Cost ~ US$600 million (Source: top500.org) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 53 or otherwise on a password-protected website for classroom use. Supercomputers⁺ © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 54 or otherwise on a password-protected website for classroom use. Scalability Scalability: the ability to increase the processing capability Scalability enables the system to handle more users, more data, or more transactions without compromising performance or stability © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 55 or otherwise on a password-protected website for classroom use. Virtual Server Virtualization: a method of logically dividing the resources of a single physical server to create multiple logical servers Each logical (virtual) server acts as its own dedicated machine © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 56 or otherwise on a password-protected website for classroom use. Data Center Data center: a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services Tour: https://youtu.be/XZmGGAbHqa0?t=123 Construction considerations for efficient operation Reduced energy especially for cooling Location: areas with milder climates and lower energy rates and land costs © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 57 or otherwise on a password-protected website for classroom use. Summary Computer hardware must be carefully selected to meet the evolving needs of the organization and its supporting information systems © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 58 or otherwise on a password-protected website for classroom use. Fundamentals & Ethics of Information Systems IS 201 Lecture 3 Binary Number System and Logic Gates Lecture 3 – Binary System and Logic Gates Learning Objectives 1. Know the different types of number systems 2. Describe positional number notation 3. Convert base 10 numbers into numbers of other bases and vice versa 4. Describe the relationship between bases 2, 8, and 16 5. Identify the basic Boolean logic operations 6. Identify the basic gates and describe the behavior of each using Boolean expressions and truth tables 7. Explain how a Boolean expression can be converted into circuits Lecture 3 – Binary System and Logic Gates Chapter Overview 1. The Importance of Learning the Binary System 2. Number Systems 3. Conversions from the Decimal System to Other Systems 4. Converting Binary to Octal and Hexadecimal 5. Binary Arithmetic 6. Fixed-Point and Floating-Point Number Representations 7. Boolean Algebra 8. Logic Gates 9. Building Computer Circuits 10. Summary Lecture 3 – Binary System and Logic Gates 1. The Importance of Learning the Binary System ◼ Modern computer systems do not represent numeric values using the decimal system. ◼ Computers use a binary or two's complement numbering system. ◼ Learning the binary system helps you to understand how the basic operations (e.g., addition) of the processor are done. ◼ To be aware of the limitations of computer arithmetic, you must understand how computers represent numbers. Lecture 3 – Binary System and Logic Gates 2. Number Systems ◼ There are four number bases commonly used in programming. Name Base Digits Symbol Binary 2 0,1 (N)2 Octal 8 0,1,2,3,4,5,6,7 (N)8 Decimal 10 0,1,2,3,4,5,6,7,8,9 (N)10 Hexadecimal 16 0,..,9,A,B,C,D,E,F (N)16 Lecture 3 – Binary System and Logic Gates Decimal Number System ◼ The Decimal Number System uses base 10. It includes the digits from 0 through 9. The weighted values for each position is as follows: 104 103 102 101 100 10-1 10-2 10-3 10000 1000 100 10 1.1.01.001 ◼ When you see a number like "123", you don't think about the value 123. Instead, you generate a mental image of how many items this value represents. In reality, the number 123 represents: 1 * 102 + 2 * 101 + 3 * 100 = 1 * 100 + 2 * 10 + 3 * 1 = 100 + 20 + 3 = 123 Lecture 3 – Binary System and Logic Gates Decimal Number System (Cont.) ◼ Each digit appearing to the left of the decimal point represents a value between zero and nine times power of ten represented by its position in the number. ◼ Digits appearing to the right of the decimal point represent a value between zero and nine times an increasing negative power of ten. ◼ For example, the value 725.194 is represented as follows: 7*102 + 2*101 + 5*100 + 1*10-1 + 9*10-2 + 4*10-3 = 7*100 + 2*10 + 5*1 + 1*0.1 + 9*0.01 + 4*0.001 = 700 + 20 + 5 + 0.1 + 0.09 +.0004 = 725.194 Lecture 3 – Binary System and Logic Gates Binary Number System ◼ The smallest "unit" of data on a binary computer is a single bit. ◼ Electronic components like transistors have a digital nature. ◼ They can be either in an "on" state or an "off" state, representing binary 1 and 0, respectively. ◼ The binary number system operates similarly to the decimal system, but with a base of 2. In binary, only the digits 0 and 1 are used. 0,1 ◼ The weighted values for each position is determined as follows: 27 26 25 24 23 22 21 20 2-1 2-2 128 64 32 16 8 4 2 1.5.25 Lecture 3 – Binary System and Logic Gates Binary to Decimal ◼ Let’s convert the following two binary numbers to decimal numbers: 10011 and 1101.01 10011= 1*24 + 0*23 + 0*22 + 1*21 + 1*20 = 1*16 + 0*8 + 0*4 + 1*2 + 1*1 = 16 + 0 + 0 + 2 + 1 = 19 1101.01= 1*23 + 1*22 + 0*21 + 1*20 + 0*2-1 + 1*2-2 = 1*8 + 1*4 + 0*2 + 1*1 + 0*.5 + 1*.25 = 8 + 4 + 0 + 1 +.25 = 13.25 Lecture 3 – Binary System and Logic Gates Octal Number System ◼ The octal number system uses base 8 and includes only the digits 0 through 7: 0,1,2,3,4,5,6,7 ◼ The weighted values for each position is as follows: 85 84 83 82 81 80 32768 4096 512 64 8 1 Lecture 3 – Binary System and Logic Gates Octal to Decimal ◼ Let’s convert the following two octal numbers to decimal numbers: 736 and 670.32 736= 7*82 + 3*81 + 6*80 = 7*64 + 3*8 + 6*1 = 448 + 24 + 6 = 478 670.32= 6*82 + 7*81 + 0*80 + 3*8-1 + 2*8-2 = 6*64 + 7*8 + 0*1 + 3*.125 + 2*.015625 = 440.40625 Lecture 3 – Binary System and Logic Gates Hexadecimal Number System ◼ The Hexadecimal Number System uses base 16 and includes the digits 0 through 9 and the letters A, B, C, D, E, and F: 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E, and F ◼ The weighted values for each position is as follows: 163 162 161 160 4096 256 16 1 Lecture 3 – Binary System and Logic Gates Hex to Decimal ◼ To convert from Hex to Decimal, multiply each hex digit by its weight and add the results. 0AFB2 = A*163 + F*162 + B*161 + 2*160 = 10*4096 + 15*256 + 11*16 + 2*1 = 40960 + 3840 + 176 + 2 = 44978 Lecture 3 – Binary System and Logic Gates 3. Conversion of Decimal Numbers ◼ Decimal to Binary Conversion ◼ Decimal to Octal conversion ◼ Decimal to Hexadecimal system Lecture 3 – Binary System and Logic Gates Decimal to Binary ◼ This method consists of two steps: ◼ Step 1 ◼ Dividing the integer part by 2 repeatedly until its value becomes 0, while keeping track of the remainder R at each division. ◼ Step 2 ◼ Concatenate the remainders from the least significant bit (LBS) at the top to the most significant bit (MSB) at the bottom. ◼ Write the number from right to left. Lecture 3 – Binary System and Logic Gates Decimal to Binary (Cont.) ◼ Converting the decimal number 18 into the binary system. Number/Base Integer Part Remainder Remark 18 /2 9 0 LSB 18 = 2 * 9 + 0 9 /2 4 1 9=2*4 + 1 4 /2 2 0 4=2*2 + 0 2 /2 1 0 2=2*1 + 0 1 /2 0 1 MSB 1 = 2 * 0 + 1 ◼ Thus, 1810 = 100102 Lecture 3 – Binary System and Logic Gates Decimal to Octal ◼ The same method is applied in this case except that we will perform successive divisions by 8 ◼ Why divide by 8? Because the base of the octal system is 8 ◼ Example: Translating the decimal number 18 into the octal system. Number/Base Integer Part Remainder Remark 18 /8 2 2 18 = 8 * 2 + 2 2 /8 0 2 2=8*0 + 2 ◼ Thus, 1810 = 228 Lecture 3 – Binary System and Logic Gates Decimal to Hexadecimal ◼ The same method is applied in this case except that we will perform successive divisions by 16 ◼ Why divide by 16? Because the base of the hexadecimal system is 16 ◼ Example: Translating the decimal number 18 into the hexadecimal system. Number/Base Integer Part Remainder Remark 18 /16 1 2 18 = 16 * 1 + 2 1 /16 0 1 1 = 16 * 0 + 1 ◼ Thus, 1810 = 1216 Lecture 3 – Binary System and Logic Gates 4. Conversion of Binary Numbers ◼ A major problem with the binary system is the large number of digits needed to represent even small values. ◼ To represent 20210, eight binary digits are needed, compared to only three in the decimal system. ◼ When dealing with large numeric values, binary numbers quickly become unmanageable. ◼ The hexadecimal (base 16) numbering system solves this issue with two key features: ◼ Compact representation. ◼ Simple conversion between hex and binary, and vice versa. Lecture 3 – Binary System and Logic Gates Uses of the Hexadecimal System ◼ Color representation ◼ 165D31 :‫اللون االخضر في العلم السعودي يمكن تمثيله كالتالي‬ Red:16, Green:5D, Blue:31 ◼ https://www.color-hex.com/ ◼ MAC (physical) addresses ◼ 00:1A:2B:3C:4D:5E ◼ Character encoding standards ◼ "IS201" equals 49 53 32 30 31 in UTF-8 ◼ URL encoding ◼ "%20" in URLs signifies the space character in UTF-8 Lecture 3 – Binary System and Logic Gates Converting Binary Numbers 1. Converting Binary to Octal 2. Converting Binary to Hexadecimal Lecture 3 – Binary System and Logic Gates Binary to Octal ◼ Convert 10101011 2 into octal 1. First, group the binary digits into sets of three from right to left 10 101 011 2. Then, for each group, multiply each digit with 2x where x is incremented from 0 to 2 from right to left 10 101 011 21 20 22 21 20 22 21 20 3. Finally, sum the numbers for each group 2 5 3 ◼ 10101011 is 253 in base 8 Lecture 3 – Binary System and Logic Gates 17 Octal to Binary ◼ Convert 718 into binary ◼ Transform each octal digit into a 3-digit binary number, starting from the right. 7 1 111 001 ◼ 718 is 1110012 Lecture 3 – Binary System and Logic Gates 17 Binary to Hexadecimal ◼ Convert 10101011 2 into hexadecimal 1. First, group the binary digits into sets of four from right to left 1010 1011 2. Then, for each group, multiply each digit with 2x where x is incremented from 0 to 3 from right to left 1010 1011 2 3 22 21 20 23 22 21 20 3. Finally, sum the numbers for each group ◼ Therefore, 10101011 2 is AB16 Lecture 3 – Binary System and Logic Gates 18 Hexadecimal to Binary ◼ Convert 𝐴116 into binary ◼ Transform each hex digit into a 4-digit binary number, starting from the right. Remember that A=10 A 1 1010 0001 ◼ 𝐴116 is 101000012 Lecture 3 – Binary System and Logic Gates 17 Exercises 1. Convert the following numbers into decimal numbers ◼ (00000001)2, (00000111)2, (010011.11)2, (011010.10)2 ,(68)8, (E4)16 2. Convert the following numbers into octal and hex ◼ (00000001)2, (00101111)2, (00010011)2, (11011010)2 3. Convert the following numbers into binary numbers. Write your answer using 8 digits (8 bits) ◼ (0)10, (10)10, (56)10, (169)10 4. Convert the following numbers into binary numbers. ◼ (135)8, (021)8, (703)8 ◼ (135)16, (021)16, (0A1)16, (0E)16 ◼ Check your answers using the following tool: [link] Lecture 3 – Binary System and Logic Gates Limitations of Computer Arithmetic ◼ Binary representation encounters difficulties with certain non-integer values like 0.110 , 0.310 , and 0.5510 ◼ These numbers are easily represented in the decimal system. ◼ But they become non-terminating in binary (i.e., infinite binary fractions). link ◼ Exercise: Using the following tool [link], compare the conversion into binary of 3.510 and 3.5510. ◼ 3.5510 is more challenging to represent in binary ◼ Rounding is often employed to deal with these challenges. However, it introduces errors in certain cases. link ◼ Exercise: In python, try 0.2+0.1 [link] Lecture 3 – Binary System and Logic Gates Limitations of Computer Arithmetic⁺ ◼ Highly recommended video: https://www.youtube.com/watch?v=PZRI1IfStY0 ◼ Rounding off errors in Java: https://www.geeksforgeeks.org/rounding-off-errors-java/ Lecture 3 – Binary System and Logic Gates 5. Binary Arithmetic 1. Binary Addition 2. Binary Subtraction Lecture 3 – Binary System and Logic Gates Addition ◼ In the binary system, there are four addition cases taking into account the digits 0 and 1 and the possible carry: Operation carry result 0+0 0 0 0+1 0 1 1+1 1 0 1+1+1 1 1 Lecture 3 – Binary System and Logic Gates Addition (Cont.) ◼ Perform the addition of the following binary numbers: 110010 and 100111 Carry values 11 110010 + 100111 1011001 Lecture 3 – Binary System and Logic Gates Subtraction ◼ The CPU doesn't perform subtraction in the same way humans do, but rather uses addition with two's complement representation to achieve subtraction operations. ◼ Complement operations are the method used to represent negative numbers. ◼ Example, the following operation 7-4 is reformulated as 7+(-4), where the negative term is represented using two's complement notation. Lecture 3 – Binary System and Logic Gates Negative Numbers in Binary ◼ Signed magnitude ◼ One’s complement ◼ Two’s complement Lecture 3 – Binary System and Logic Gates Signed Magnitude ◼ In signed magnitude representation, the leftmost bit is the sign bit (0 for positive, 1 for negative). ◼ The remaining bits represent the magnitude of the number (‫)قيمة الرقم‬. ◼ Example: ◼ 7 in signed magnitude: 0000 0111 ◼ -7 in signed magnitude: 1000 0111 ◼ Limitation: Cannot perform arithmetic operations directly ◼ Try 7+(-3) ◼ 7+(-3) = 0111+(-0011) = 0111+1011 = 0010 ◼ The result is incorrect Lecture 3 – Binary System and Logic Gates One’s Complement ◼ In one's complement, negative numbers are represented by inverting all the bits of the corresponding positive number. ◼ Example: ◼ 5 in one's complement (8-bit): 0000 0101 ◼ −5 in one's complement (8-bit): 1111 1010 (Inverted bits of +5) ◼ Limitation: Cannot perform arithmetic operations directly ◼ Try 7+(-3) ◼ 7+(-3) = 0111+(-0011) = 0111+1100 = 0011 ◼ The result is incorrect Lecture 3 – Binary System and Logic Gates Two’s Complement ◼ In two's complement, negative numbers are represented by: ◼ Inverting all the bits of the corresponding positive number. ◼ Adding 1 to the result. ◼ Example: ◼ 7 in two's complement (8-bit): 0000 0111 ◼ −7 in two's complement (8-bit): 1111 1001 (Invert 0000 0111 then add 1) ◼ Two's complement performs arithmetic operations accurately. ◼ Try 7-3 ◼ 7+(-3) = 0111+(-0011) = 0111+1101 = 0100 Lecture 3 – Binary System and Logic Gates Exercises 1. Perform the following binary operations ◼ 11 + 11, 1101.10 + 111, 11111 + 100011 2. Perform the following operation using two’s complement ◼ (44 - 13)10 [solved in this link] 3. Using two’s complement, convert (- 43)10 into binary. Write your answer using 8 digits. [solved in this link] 4. Convert (1111 1000)2 ,represented in two’s complement, into decimal. ◼ The leftmost bit is 1, therefore it’s a negative number ◼ Invert the binary bits, add one ◼ Then convert to decimal ◼ The final result is (- 8)10 Lecture 3 – Binary System and Logic Gates Exercises 5. Considering the binary number (1111 1000)2 represented in two’s complement, is it a positive or negative number? ◼ Negative, because the MSB is 1 6. Considering the binary number (0111 1000)2 represented in two’s complement, is it a positive or negative number? ◼ Positive, because the MSB is 0 Lecture 3 – Binary System and Logic Gates Exponential Growth in Value Representation: 4-bit vs. 8-bit ◼ 4-bit Representation: ◼ With 4 bits, we can represent 2^4 = 16 unique values. ◼ These values range from 0000 to 1111 in binary, or 0 to 15 in decimal. ◼ 8-bit Representation: ◼ With 8 bits, we can represent 2^8 = 256 unique values. ◼ These values range from 00000000 to 11111111 in binary, or 0 to 255 in decimal. ◼ Transitioning from 4-bit to 8-bit representation results in an exponential increase in the number of possible values. Lecture 3 – Binary System and Logic Gates Addressing Limitations in 32-bit Systems ◼ 32-bit Systems: ◼ Memory addresses are represented by 32 bits, allowing for a total of 2^32 (=4 Giga) unique addresses, resulting in a maximum addressable memory of approximately 4GB. ◼ 64-bit Systems: ◼ With 2^64 unique addresses, 64-bit systems can theoretically address up to 16 exabytes (EB) of memory. ◼ The increase of unique memory addresses from 32 to 64 bits is exponential, not linear ◼ With each additional bit, the addressable memory space doubles. ◼ The transition from 32-bit to 64-bit systems overcomes the memory limitations of the 32-bit systems. Lecture 3 – Binary System and Logic Gates 6. FIXED-POINT AND FLOATING- POINT NUMBER REPRESENTATIONS Lecture 3 – Binary System and Logic Gates Fixed-Point Representation ◼ Represents numbers with a fixed number of digits after the decimal point. ◼ Example: 1010.1000 is a fixed-point number with 4 integer bits and 4 fractional bit. ◼ Integer= 1010, Fraction = 1000 ◼ Disadvantage: Limited range and precision compared to floating-point representation. Lecture 3 – Binary System and Logic Gates Fixed Point Representation of Negative Number ◼ Negative numbers in fixed-point representation are typically represented using signed representation and two's complement notation. ◼ Signed representation: ◼ Let's consider the number -14.25 and represent it in fixed-point binary using 5 bits for the integer and 3 bits for the fraction. ◼ 14.25 = 01110.010 => -14.25= 11110.010 ◼ Two’s complement: ◼ 14.25 = 01110.010 => (invert and add 1) -14.25= 10001.110 Lecture 3 – Binary System and Logic Gates Floating-Point Representation ◼ It represents numbers as a scientific notation (as in 1.010101001x 2^6), allowing a variable number of digits before and after the decimal point. ◼ It consists of three parts: sign bit, exponent, and fraction. sign e ponent (8 bits fraction ( bits 0 0 1 1 1 1 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 01 1 0 (bit inde 0 ◼ Example: 85.125 ◼ 8510 = 10101012 and 0.12510 = 0012 ◼ 85.12510 = 1010101.0012 = 1.010101001 x 2^6 ◼ Fraction= 010101001, Exponent = 6, Sign = 0 ◼ The representation involves more details, but here we're just providing a basic explanation. Lecture 3 – Binary System and Logic Gates Range of Values: Fixed-Point vs Floating-Point ◼ Let's compare the range expansion using 32 bits for both fixed-point and floating-point representations ◼ For the fixed-point, if we allocate 16 bits for the integer part and 16 bits for the fractional part, the range of representable numbers would be from −32,768.9999847412109375 to 32,767.9999847412109375 ◼ The range of numbers in floating-point (using the IEEE 754 single-precision format) is approximately from ±1.175 × 10−38 to ±3.403 × 1038 Lecture 3 – Binary System and Logic Gates Character Encoding: ASCII ◼ ASCII (American Standard Code for Information Interchange) is developed in the early days of computing. ◼ Uses 7 bits to represent 128 characters, including ◼ Uppercase and lowercase letters (A-Z, a-z) ◼ Numbers (0-9) ◼ Common punctuation marks (!, ?, :, etc.) ◼ Control characters (spacing, backspace, and carriage return, etc.) ◼ Example ◼ In ASCII, 'A' is represented as 01000001. ◼ Limitation: ASCII represents English letters only. Lecture 3 – Binary System and Logic Gates Character Encoding: Extended ASCII ◼ Extended ASCII extends the basic ASCII set by utilizing 8 bits, thus accommodating an additional 128 characters. ◼ 128 characters from ASCII + additional 128 characters = 256 ◼ The additional characters are usually of a specific language such as Arabic, Turkish, and Thai. [link] ◼ Unlike ASCII, Extended ASCII lacks a unified standard. ◼ Consequently, compatibility issues arise. ◼ For example, when a system that uses Latin/Arabic interacts with another system that uses Latin/Turkish. Lecture 3 – Binary System and Logic Gates Character Encoding: UTF-8 ◼ UTF-8 (Unicode Transformation Format) ◼ Uses a flexible system to represent characters from almost any language, including emojis! ◼ A variable-length encoding. ◼ UTF-8 uses one to four bytes to represent characters. ◼ Encodes more than 1.1 million characters. ◼ The first 100,000 characters in UTF-8 [link] ◼ In theory, it’s capable of encoding more than a billion characters! Lecture 3 – Binary System and Logic Gates Character Encoding: UTF-8 ◼ UTF-8 is efficient and backward compatible with ASCII ◼ By using one byte for ASCII characters, UTF-8 ensures backward compatibility For instance, the space character (' ' retains its ASCII representation (00100000 in UTF-8 ◼ UTF-8 handles special characters that aren’t in ASCII ◼ These less common characters are represented using multiple bytes in UTF-8 ◼ E amples: ◼ The Euro sign ('€' is encoded as 11100010 10000010 10101100 ◼ is encoded as 11100010 10011000 10111010 Lecture 3 – Binary System and Logic Gates Optional Resources⁺ ◼ How does the UTF-8 work? ◼ https://www.youtube.com/watch?v=MijmeoH9LT4 ◼ https://symbl.cc/en/ Lecture 3 – Binary System and Logic Gates

Use Quizgecko on...
Browser
Browser