Académique Documents
Professionnel Documents
Culture Documents
Linux is almost always a free operating system with multiple sources distribution. In
contrast, Windows and Mac OS X are some of the most expensive operating systems
available. If we want to cut on costs, you can definitely benefit from choosing Linux for your
everyday needs.
As the computer gets older, it demands more resources such as RAM eventually
slowing down the system. With Linux’s low-resource approach, we are less likely to
encounter slower load times.
Performance
Unlike Windows, Linux does not easily become bogged down with spyware, viruses,
trojans, etc., which can greatly reduce a computer’s performance. Also, because Linux does
not have a registry like Windows, it is not plagued with registry errors which can slow down
a computer over time. Finally, the hard drives on Windows (especially Windows XP and
older) computers need to be defragmented on a regular basis in order to maintain faster
performance, due to being formatted in NTFS. On the other hand, because Linux is normally
formatted in a different way using ext4 among others, there is no need to defragment a Linux
hard drive.
The best feature of Linux operating systems is its low susceptibility to virus and
malware infestation. If we have been a Windows user for a long time, we would know how
problematic Windows is when it comes to viruses. With Linux, we are spared from all the
hassle of having to constantly update our anti-virus software or scan our computer every so
often.
One of the key advantages of Linux lies in the way account privileges are assigned. In
Windows, users are generally given administrator access by default, which means they pretty
much have access to everything on the system, even its most crucial parts. It happens in the
case of viruses and malware. It is like giving terrorists high-level government positions.
With Linux, on the other hand, users do not usually have such "root" privileges;
rather, they are typically given lower-level accounts. Hence in a Linux system the virus won't
have the root access it would need to do damage the entire system; more likely, just the user's
local files and programs would be affected.
One nice security feature in Linux is that files must be made to be executable by
someone with administrator privileges, which requires a password. So even if a Linux virus is
loaded on a Linux computer, it will not be able to run without the user who has administrator
privileges intentionally making it executable.
Another important aspect of Linux security is the fact that it is open source. Because
the programing code is available for anyone to view, there are many eyes constantly
examining it, which makes it highly difficult for malware to be hidden within the code. Also,
security patches normally come much quicker to Linux than other operating systems because
so many people are contributing to it.
Stability
Linux operating systems are much more stable than the others. Even if an application
in Linux crashes which is itself very rare, then generally no harm is done to the kernel itself
and the problem can be solved just by re installing that particular application.
Open Source
Portability
Another area where Linux shines over all other operating systems is in its ability to
migrate an installation from hardware to hardware. Linux has an uncanny ability to be able to
relocate so long as the architecture was the same. We can take certain directories and move
them from machine to machine. This works well with the /home directory. Having the ability
to migrate /home directory from one machine to another can make building machines easily.
Network friendliness
Linux was developed by a group of programmers over the Internet and has therefore
strong support for network functionality; client and server systems can be easily set up on any
computer running Linux. It can perform tasks such as network backups faster and more
reliably than alternative systems.
Flexibility
Linux can be used for high performance server applications, desktop applications, and
embedded systems. We can save disk space by only installing the components needed for a
particular use. We can restrict the use of specific computers by installing for example only
selected office applications instead of the whole suite.
2) Discuss the different uses of computers in libraries (15)
A modern library cannot be imagined without the application of computers.
Computers arebeen used successfully in the following areas of library activities.
In library housekeeping operation, the computer is used for acquisition of books and
other reading materials, their classification, cataloguing, circulation and serial control.
a) Acquisition
The selection of materials can be made by the computer. Any library which is a part
of online computerized library system has access to catalogue entries and bibliographic data
of all the libraries in the system. These databases can be used as a selection tools to purchase
new books. Other offline databases can also be used as selection tools for noncurrent
documents and sometimes out of print books. For other documents, conventional book
selection methods may be used. The MARC bibliographic record service has opened up a
new vista in both cataloguing and bibliographic database that can be used as a book selection
tool.
The ordering and acquisition are the routine jobs in the library and for a single time
ordering it requires repetitive operation by different sections. These repetitive operations and
the requisite checking can very well be done by the application of the computer system. Both
offline and online acquisition can be performed by the use of computers.
b) Classification
c) Cataloguing
The computerized cataloguing system operates with high speed for performing routine
and repetitive jobs. Besides, in the cataloguing unit, computer can also be used in various
other ways such as producing book plates, book pockets, book cards, spine labels, etc. It can
also produce a variety of records, card catalogues in the book form, printed catalogue, etc. as
byproducts.
d) Serial Control
Serials are continuing publication having reasonably permanent titles and appearing
usually at regular intervals. Their contents usually vary from issue to issue. An article as a
single bibliographic unit may be published in more than one issue and even in more than one
volume. Obviously, the users may be interested in an issue of a serial as a bibliographic unit,
or an article spread over a number of issues as a bibliographic unit. So, serial control
comprises complex operations of library activities because of the varying nature and
characteristics of Serial as library material.
In case of Serial, the current issues, the retrospective or immediate back issues and
bound volumes under every year of publication is an ongoing process. In this case, the library
should encounter the search problem because of the conflict between the title and the
corporate body, the old titles and the changed titles, nature of irregularity in publication
(more than one issue in a single publication and the like). These situations pose the problem
of listing, acquisition, accessioning, cataloguing and creation of records in the desired format.
e) Circulation
The circulation activities are the life-stream of the library services. The library
documents are for use and are intended for the users. At various points, documents are to be
trapped for the users who have recorded their priority in using such documents. The
circulation is a flow of document, but the flow should be controlled by library operations so
as to serve the users in the best possible way with the available materials in the library.
B) Library Administrations
In case of library administration, the library automation helps in
c) Exception Reporting
C) Information Retrieval
Today, Online Public Access Catalogue (OPAC) or sometimes Web OPAC facility
provided by the library and information centres helps in easy retrieval of information.
Computers are also used for searching Library Database: eg. International Nuclear
Information System.
Computers can also be used to build digital or virtual collection or for institutional
repository of the library.
E) Resource Sharing
In order to facilitate the provision of material request on inter library loan basis, the
use of computers and other latest telecommunication devices is being put to use in almost all
the countries of the world. The Online Union catalogue is also a product of computer
application in library.
F) Library Network
G) Information System
H) User Services
The library automation also helps to provide Current Awareness Service (CAS),
Selective Dissemination of Information (SDI) Services, Indexing and Abstracting Service,
Web Based Translation Services, Computer Based Indexing and Abstracting Services, and so
on.
Today, the computers have entered each and every area of a library. The library
automation is the application of modern technologies including the application of computer
hardware and software, different storage medias, telecommunications, etc. which help the
mechanization of any activity in the library. To implement the computer in the library, the
selection of proper hardware and software forms an essential part. If proper software is
selected, it will automatically generate or create Online Public Access Catalog which will
replace the traditional card catalogue of the library. The feature-rich software will also have
the provision of retrospective conversion. It will help the library to enter minimum of details
about the document in their collection in the database of some other libraries and will help in
getting the full bibliographic record of the document that can be embedded in the local
database.
3) Describe the concept of information society. Discuss the factors that led to the
arrival of ‘Information Society’. (15)
Pg 330 to 334
II)
Memory Description
Cache memory is memory actually embedded inside the CPU. Cache memory is
very fast, typically taking only once cycle to access, but since it is embedded
Cache directly into the CPU there is a limit to how big it can be. In fact, there are several
sub-levels of cache memory (termed L1, L2, L3) all with slightly increasing
speeds.
All instructions and storage addresses for the processor must come from RAM.
Although RAM is very fast, there is still some significant time taken for the CPU
RAM
to access it (this is termed latency). RAM is stored in separate, dedicated chips
attached to the motherboard, meaning it is much larger than cache memory.
We are all familiar with software arriving on a floppy disk or CDROM, and saving
our files to the hard disk. We are also familiar with the long time a program can
Disk take to load from the hard disk - having physical mechanisms such as spinning
disks and moving heads means disks are the slowest form of storage. But they are
the largest form of storage.
The important point to know about the memory hierarchy is the tradeoffs between
speed and size - the faster the memory the smaller it is.
The reason caches are effective is because computer code generally exhibits two
forms of locality:
1. Spatial locality suggests that data within blocks is likely to be accessed together.
2. Temporal locality suggests that data that was used recently will likely be used again
shortly.
This means that benefits are gained by implementing as much quickly accessible memory
(temporal) storing small blocks of relevant information (spatial) as practically possible.
Cache Memory
Cache is one of the most important elements of the CPU architecture. To write
efficient code developers need to have an understanding of how the cache in their systems
works.
The cache is a very fast copy of the slower main system memory. Cache is much
smaller than main memories because it is included inside the processor chip alongside the
registers and processor logic. This is prime real estate in computing terms, and there are both
economic and physical limits to its maximum size. As manufacturers find more and more
ways to cram more and more transistors onto a chip cache sizes grow considerably, but even
the largest caches are tens of megabytes, rather than the gigabytes of main memory or
terrabytes of hard disk otherwise common.
The cache is made up of small chunks of mirrored main memory. The size of these
chunks is called the line size, and is typically something like 32 or 64 bytes. When talking
about cache, it is very common to talk about the line size, or a cache line, which refers to one
chunk of mirrored main memory. The cache can only load and store memory in sizes a
multiple of a cache line.
Caches have their own hierarchy, commonly termed L1, L2 and L3. L1 cache is the
fastest and smallest; L2 is bigger and slower, and L3 more so.
Since the computer can be used in performing the various activities of the library,
library automation can serve as a remedy to all the existing ills of libraries.
The user of any library nowadays expects to use their computer literacy in the library
environment. If the library does not go for automation it is felt that it will not be able to cope
with this new generation of users. The application of computer in libraries thus hopes to make
a positive change towards this end.
The use of computer almost invariably speeds up the flow of work within the system.
New books, reports and other materials can therefore be released sooner to the waiting reader.
It will help the inputting of data only for a single time as the integrated nature of software
helps for its subsequent use for other purposes, and reduces duplication of the efforts or work.
The searching of information can also be performed speedily, which will save time of the
library staff and the user.
OPAC
The library catalogue forms the base of most of the library activities such as
circulation, reference service and literature search. The introduction of library automation
brings OPAC facility to the library. The library staff also gets relief from the cumbersome
jobs of writing and preparing card catalogues and their subsequent filling.
Stock Taking
Stock taking is an inspection to check what is in the stock in relation to what it should
be. In this process the current file is compared with the inventory file (the old list of
documents possessed by the library) and the unmatched records in the inventory files are
listed out. This list constitutes the untraceable or lost document.
4) Describe the importance of barcode as an input device in libraries. (5)
The data conversion through the barcode is much faster than data entry through
the keyboard by human being. Adopting barcode technology will improve input
by factor of 10,000 times.
Since barcode is in a machine readable format, data entry is always free from error
or at least the error rate is minimal. In other words, accuracy can be maintained.
Human operator will commit undetected error for every 300 input.
Data collection through barcode technique is much cheaper, faster and
commercially viable.
User friendly operation and easily connected to wide range of computers and
control equipment.
5G
As the next step in the continuous innovation and evolution of the mobile industry,
5G will not only be about a new air interface with faster speeds, but it will also address
network congestion, energy efficiency, cost, reliability, and connection to billions of people
and devices. With a 2020 commercialization horizon, 2015 be the year when we move from
these concepts to technology trials and standards development.
Fiber Everywhere
2014 was the year of “fiber everywhere” propelled by efforts to improve connectivity
and address demand increases from the use of high definition video, 3G/4G, streaming,
podcast and other broadband services. This increased demand exposed existing bottlenecks in
the communications infrastructure.
Cyber Security
2014 was most remarkable for demonstrating that everything connected to the Internet
and are hacked. On daily basis we are hearing that retailers, financial institutions and
technology companies are being hacked. No one is cyber-safe and the road to the future leads
through new cyber security technologies beyond current perimeter firewall-like defenses.
Green Communications
It is being reported that communication technologies are responsible for about 2-4%
of all of carbon footprint generated by human activity. This highlights the need to focus on
managing these numbers and Green communications is doing just that. The trend is tackling
first mobile networks because of their high energy use. Base stations and switching centers
could count for between 60% and 85% of the energy used by an entire communication
system. Environmentally friendly batteries, renewable energy sources, and intelligent
management of the power systems are some of the proposed solutions.
Smarter Smartphones, Connected Sensors
The size, shape, and capabilities of these ubiquitous communication devices continue
evolving, and so are prices which, driven by cost and performance improvements in digital
technologies are falling rapidly. Beyond smartphones, tablets, connected sensors and body-
worn wearables will also make headlines. Connected sensors will find their way into vehicles
(smartcards), into urban areas (smartcies) and into our infrastructure (smartgrid).
Molecular Communications