Verified Document

Computer Science Fundamentals Too Often The Mechanistic Essay

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information.

The purpose of this essay is identify and explain some of the fundamental concepts in the framework of computer architecture. The essay will discuss the Von Neumann architecture and its contribution to the science and the many ideas that this idea has spawned. The essay will then address the importance of Boolean operations and the importance that this language of symbols plays in the logical processes of the computing operation. The essay will finally examine the concepts and fundamentals behind the various types of memory and storage that computer architecture needs to flourish and produce tangible results that can benefit the whole of mankind in new and unprecedented ways.

Von Neumann Architecture

According to Riley (1987) the Von Neumann Architecture of computer systems is based more on an idea of a compilation of four individual parts. He wrote "Von Neumann begins his "Preliminary Discussion" with a broad description of the general-purpose computing machine containing four main "organs." These are identified as relating to arithmetic, memory, control, and connection with the human operator. In other words, the arithmetic logic unit, the control unit, the memory, and the input-output devices that we see in the classical model of what a computer "looks like." Each one of these elements holds their own special place in a Von Neumann architecture that has eventually blossomed into today's computing environment and is prevalent in so many ways.

The four organs or elements are still vital components of any computing architecture in today's world. These are the four basic functions of all computing systems and resonate in other biological systems as well. Von Neumann's architecture reflects larger principles that are reflected in nature that have seem to be reapplied in a technological or material fashion. This is perhaps why the computers work so well with humans in today's age.

Each...

The memory organ is idealized to have dual function, one to hold the memory and the other to process it, much like the human brain. The control unit is a managing component that moves the data to the necessary place in space and time. The input-output idea is much like the human body in that in needs to both intake and give information to sustain itself. The Arithmetic Logic unit suggests that a mathematical approach is necessary to provide the logical processes in the system.
What is most remarkable about this idea is that the concepts were formed nearly 80 years ago. The evolution of the Von Neumann architecture has exposed its faults and have led to other greater discovery in computer science, however it is the principles behind the architecture that have stood the test of time. Myers (1987 ) agreed: "Any discussion of computer architectures, of how computers and computer systems are organized, designed, and implemented, inevitably makes reference to the "von Neumann architecture" as a basis for comparison. And of course this is so, since virtually every electronic computer ever built has been rooted in this architecture."

System Bus

The system bus is the pathway architecture in which the components of a computer system communicate with each other. The CPU is at one end of the bus and the memory is at the other end. The system bus is measured in speed, and the greater amount of paths or roadways will provide the most responsive reactions by the computer system.

The systems bus itself carries three different types of information: address, data and control. These three forms of data provide a map or plan of the pathways that the information needs to travel within the computer system. The address information is where the data is located, the data itself is the pertinent information, and the control is the flow of this information, used much like a volume knob on a stereo.

Boolean Operators

In the development of computer technology, other disciplines of science have been incorporated to help with the evolution and eventual success of the science. Boolean operators, is a form of mathematical logic that has been incorporated in the programming languages of many computer syntaxes. According to…

Sources used in this document:
References

Himowitz, M. (2001). Don't mix up PC memory, disk storage. The Baltimore Sun 29 Oct 2001. Retrieved from http://articles.baltimoresun.com/2001-10-29/entertainment/0110290156_1_hard-disk-storage-computer-memory-windows-xp

Goldstine, H.H. And von Neumann, J. On the principles of large scale computing machines. In Taub, A.H., editor, John von Neumann Collected Works, The Macmillan Co., New York, Volume V, 1-32.

MIT Libraries (nd). "Boolean Operators." Viewed 28 Jan 2014. Retrieved from http://libguides.mit.edu/content.php?pid=36863&sid=271372

Riley, H. (1987). The Von Neumann Architecture of Computer Systems. California State Polytechnic University, Sep 1987. Retrieved from http://www.csupomona.edu/~hnriley/www/VonN.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Science Choosing One's Major
Words: 2100 Length: 7 Document Type: Essay

As with other information technology jobs, outsourcing of software development to other countries may temper somewhat employment growth of computer software engineers. Firms may look to cut costs by shifting operations to foreign countries with lower prevailing wages and highly educated workers. Jobs in software engineering are less prone to being off shored than are jobs in other computer specialties, however, because software engineering requires innovation and intense research

Computer Science: Networking the Objective
Words: 2238 Length: 8 Document Type: Thesis

(Cisco, 2009) It is reported by Nortel that it has been indicated by 86% of service providers that there is a high demand for Ethernet services today. The result is that carriers are seeking to fulfill the demand through "upgrading their metro networks to deliver cost-effective Ethernet-based services to their customers." (2009) MPLS is stated to have been invented for the express purpose of "...of solving the problem of bridging

Computer Science Defensive Response Strategy
Words: 802 Length: 3 Document Type: Term Paper

These activities include securing the current computing environment which includes any current tools, patches, updates and best known methods. This represents the bulk of the cost effective security capabilities and facilitates better detection. Visibility to key areas and activities is vital. Effective monitoring to identify issues, breaches and attacks is necessary. This drives immediate interdiction by response capabilities. Efficient management of efforts to contain, repair and recover as needed

Computer Science Having Read Newman's Chapter 1,
Words: 370 Length: 1 Document Type: Term Paper

Computer Science Having read Newman's Chapter 1, would you consider the security requirements across all environments to be the same? Not all security requirements are the same in all network environments. Some systems are more vulnerable to the threat of viruses that permanently infiltrate the network's hardware, other to worms that do not permanently damage the hardware but cause programs to 'crash' through such tricks as forcing programs to infinitely reboot themselves.

Computer Science MS Degree Application
Words: 797 Length: 2 Document Type: Term Paper

I have a knack for computer science/web design. In middle school, my uncle showed me how to upgrade the memory on my desktop computer. It was not long before I was installing systems, detecting and resolving computer issues and replacing hard drives on laptops. My first course at (name university) continued this interest with projects using Perl, CGI and PHP. Later, I added Macromedia Flash for animation to my repertoire

Computer Science Long-Term Planning and
Words: 1180 Length: 4 Document Type: Term Paper

These certifications are also on the rise because of their in detail technical focus. They help people to understand the technical skills that are associated with what professionals are trying to protect, and the intrinsic security capabilities of an infrastructure. Long-term certification On a more long-term basis it would be a good idea for the staff of the it department to seek Global information assurance certifications. "The SANS Institute offers this

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now