Pathfinders: Memories Mac OS

broken image


If Mac OS X needs to use all 4 GB of main memory, it can still make use of any free space on your hard disk as an extension to that memory. Unfortunately, virtual memory is much slower than the physical RAM installed in your computer, because hard disks cannot match the speed of memory chips.

  • Download and play free Mystery Games for Mac. Play detective and solve baffling cases in our huge selection of Mystery Games!
  • The most advanced file manager for mac. Makers of Path Finder for macOS. The most advanced file manager for mac. Home Purchase Blog Support Download Cocoatech. Home Purchase Blog Support Download 60 DAY. Money Back Guarantee.

Efficient memory management is an important aspect of writing high performance code in both OS X and iOS. Minimizing memory usage not only decreases your application's memory footprint, it can also reduce the amount of CPU time it consumes. In order to properly tune your code though, you need to understand something about how the underlying system manages memory.

Both OS X and iOS include a fully-integrated virtual memory system that you cannot turn off; it is always on. Both systems also provide up to 4 gigabytes of addressable space per 32-bit process. In addition, OS X provides approximately 18 exabytes of addressable space for 64-bit processes. Even for computers that have 4 or more gigabytes of RAM available, the system rarely dedicates this much RAM to a single process.

To give processes access to their entire 4 gigabyte or 18 exabyte address space, OS X uses the hard disk to hold data that is not currently in use. As memory gets full, sections of memory that are not being used are written to disk to make room for data that is needed now. The portion of the disk that stores the unused data is known as the backing store because it provides the backup storage for main memory.

Although OS X supports a backing store, iOS does not. In iPhone applications, read-only data that is already on the disk (such as code pages) is simply removed from memory and reloaded from disk as needed. Writable data is never removed from memory by the operating system. Instead, if the amount of free memory drops below a certain threshold, the system asks the running applications to free up memory voluntarily to make room for new data. Applications that fail to free up enough memory are terminated.

Note: Unlike most UNIX-based operating systems, OS X does not use a preallocated disk partition for the backing store. Instead, it uses all of the available space on the machine's boot partition.

The following sections introduce terminology and provide a brief overview of the virtual memory system used in both OS X and iOS. For more detailed information on how the virtual memory system works, see Kernel Programming Guide.

About Virtual Memory

Virtual memory allows an operating system to escape the limitations of physical RAM. The virtual memory manager creates a logical address space (or 'virtual' address space) for each process and divides it up into uniformly-sized chunks of memory called pages. The processor and its memory management unit (MMU) maintain a page table to map pages in the program's logical address space to hardware addresses in the computer's RAM. When a program's code accesses an address in memory, the MMU uses the page table to translate the specified logical address into the actual hardware memory address. This translation occurs automatically and is transparent to the running application.

As far as a program is concerned, addresses in its logical address space are always available. However, if an application accesses an address on a memory page that is not currently in physical RAM, a page fault occurs. When that happens, the virtual memory system invokes a special page-fault handler to respond to the fault immediately. The page-fault handler stops the currently executing code, locates a free page of physical memory, loads the page containing the needed data from disk, updates the page table, and then returns control to the program's code, which can then access the memory address normally. This process is known as paging.

If there are no free pages available in physical memory, the handler must first release an existing page to make room for the new page. How the system release pages depends on the platform. In OS X, the virtual memory system often writes pages to the backing store. The backing store is a disk-based repository containing a copy of the memory pages used by a given process. Moving data from physical memory to the backing store is called paging out (or 'swapping out'); moving data from the backing store back in to physical memory is called paging in (or 'swapping in'). In iOS, there is no backing store and so pages are are never paged out to disk, but read-only pages are still be paged in from disk as needed.

In OS X and in earlier versions of iOS, the size of a page is 4 kilobytes. In later versions of iOS, A7- and A8-based systems expose 16-kilobyte pages to the 64-bit userspace backed by 4-kilobyte physical pages, while A9 systems expose 16-kilobyte pages backed by 16-kilobyte physical pages. These sizes determine how many kilobytes the system reads from disk when a page fault occurs. Disk thrashing can occur when the system spends a disproportionate amount of time handling page faults and reading and writing pages, rather than executing code for a program.

Paging of any kind, and disk thrashing in particular, affects performance negatively because it forces the system to spend a lot of time reading and writing to disk. Reading a page in from the backing store takes a significant amount of time and is much slower than reading directly from RAM. If the system has to write a page to disk before it can read another page from disk, the performance impact is even worse.

Details of the Virtual Memory System

The logical address space of a process consists of mapped regions of memory. Each mapped memory region contains a known number of virtual memory pages. Each region has specific attributes controlling such things as inheritance (portions of the region may be mapped from 'parent' regions), write-protection, and whether it is wired (that is, it cannot be paged out). Because regions contain a known number of pages, they are page-aligned, meaning the starting address of the region is also the starting address of a page and the ending address also defines the end of a page.

The kernel associates a VM object with each region of the logical address space. The kernel uses VM objects to track and manage the resident and nonresident pages of the associated regions. A region can map to part of the backing store or to a memory-mapped file in the file system. Each VM object contains a map that associates regions with either the default pager or the vnode pager. The default pager is a system manager that manages the nonresident virtual memory pages in the backing store and fetches those pages when requested. The vnode pager implements memory-mapped file access. The vnode pager uses the paging mechanism to provide a window directly into a file. This mechanism lets you read and write portions of the file as if they were located in memory.

In addition to mapping regions to either the default or vnode pager, a VM object may also map regions to another VM object. The kernel uses this self referencing technique to implement copy-on-write regions. Copy-on-write regions allow different processes (or multiple blocks of code within a process) to share a page as long as none of them write to that page. When a process attempts to write to the page, a copy of the page is created in the logical address space of the process doing the writing. From that point forward, the writing process maintains its own separate copy of the page, which it can write to at any time. Copy-on-write regions let the system share large quantities of data efficiently in memory while still letting processes manipulate those pages directly (and safely) if needed. These types of regions are most commonly used for the data pages loaded from system frameworks.

Each VM object contains several fields, as shown in Table 1.

Table 1 Fields of the VM object

Field

Description

Resident pages

A list of the pages of this region that are currently resident in physical memory.

Size

The size of the region, in bytes.

Pager

The pager responsible for tracking and handling the pages of this region in backing store.

Shadow

Used for copy-on-write optimizations.

Copy

Used for copy-on-write optimizations.

Attributes

Flags indicating the state of various implementation details.

If the VM object is involved in a copy-on-write (vm_copy) operation, the shadow and copy fields may point to other VM objects. Otherwise both fields are usually NULL.

Wired Memory

Pathfinders:

Wired memory (also called resident memory) stores kernel code and data structures that must never be paged out to disk. Applications, frameworks, and other user-level software cannot allocate wired memory. However, they can affect how much wired memory exists at any time. For example, an application that creates threads and ports implicitly allocates wired memory for the required kernel resources that are associated with them.

Table 2 lists some of the wired-memory costs for application-generated entities.

Table 2 Wired memory generated by user-level software

Resource

Wired Memory Used by Kernel

Process

16 kilobytes

Thread

blocked in a continuation—5 kilobytes; blocked—21 kilobytes

Mach port

116 bytes

Mapping

32 bytes

Library

2 kilobytes plus 200 bytes for each task that uses it

Memory region

160 bytes

Note: These measurements may change with each new release of the operating system. They are provided here to give you a rough estimate of the relative cost of system resource usage.

As you can see, every thread, process, and library contributes to the resident footprint of the system. In addition to your application using wired memory, however, the kernel itself requires wired memory for the following entities:

  • VM objects

  • the virtual memory buffer cache

  • I/O buffer caches

  • drivers

Wired data structures are also associated with the physical page and map tables used to store virtual-memory mapping information, Both of these entities scale with the amount of available physical memory. Consequently, when you add memory to a system, the amount of wired memory increases even if nothing else changes. When a computer is first booted into the Finder, with no other applications running, wired memory can consume approximately 14 megabytes of a 64 megabyte system and 17 megabytes of a 128 megabyte system.

Wired memory pages are not immediately moved back to the free list when they become invalid. Instead they are 'garbage collected' when the free-page count falls below the threshold that triggers page out events.

Page Lists in the Kernel

The kernel maintains and queries three system-wide lists of physical memory pages:

  • The active list contains pages that are currently mapped into memory and have been recently accessed.

  • The inactive list contains pages that are currently resident in physical memory but have not been accessed recently. These pages contain valid data but may be removed from memory at any time.

  • The free list contains pages of physical memory that are not associated with any address space of VM object. These pages are available for immediate use by any process that needs them.

When the number of pages on the free list falls below a threshold (determined by the size of physical memory), the pager attempts to balance the queues. It does this by pulling pages from the inactive list. If a page has been accessed recently, it is reactivated and placed on the end of the active list. In OS X, if an inactive page contains data that has not been written to the backing store recently, its contents must be paged out to disk before it can be placed on the free list. (In iOS, modified but inactive pages must remain in memory and be cleaned up by the application that owns them.) If an inactive page has not been modified and is not permanently resident (wired), it is stolen (any current virtual mappings to it are destroyed) and added to the free list. Once the free list size exceeds the target threshold, the pager rests.

The kernel moves pages from the active list to the inactive list if they are not accessed; it moves pages from the inactive list to the active list on a soft fault (see Paging In Process). When virtual pages are swapped out, the associated physical pages are placed in the free list. Also, when processes explicitly free memory, the kernel moves the affected pages to the free list.

Paging Out Process

In OS X, when the number of pages in the free list dips below a computed threshold, the kernel reclaims physical pages for the free list by swapping inactive pages out of memory. To do this, the kernel iterates all resident pages in the active and inactive lists, performing the following steps:

  1. If a page in the active list is not recently touched, it is moved to the inactive list.

  2. If a page in the inactive list is not recently touched, the kernel finds the page's VM object.

  3. If the VM object has never been paged before, the kernel calls an initialization routine that creates and assigns a default pager object.

  4. The VM object's default pager attempts to write the page out to the backing store.

  5. If the pager succeeds, the kernel frees the physical memory occupied by the page and moves the page from the inactive to the free list.

Note: In iOS, the kernel does not write pages out to a backing store. When the amount of free memory dips below the computed threshold, the kernel flushes pages that are inactive and unmodified and may also ask the running application to free up memory directly. For more information on responding to these notifications, see Responding to Low-Memory Warnings in iOS.

Paging In Process

The final phase of virtual memory management moves pages into physical memory, either from the backing store or from the file containing the page data. A memory access fault initiates the page-in process. A memory access fault occurs when code tries to access data at a virtual address that is not mapped to physical memory. There are two kinds of faults:

  • A soft fault occurs when the page of the referenced address is resident in physical memory but is currently not mapped into the address space of this process.

  • A hard fault occurs when the page of the referenced address is not in physical memory but is swapped out to backing store (or is available from a mapped file). This is what is typically known as a page fault.

When any type of fault occurs, the kernel locates the map entry and VM object for the accessed region. The kernel then goes through the VM object's list of resident pages. If the desired page is in the list of resident pages, the kernel generates a soft fault. If the page is not in the list of resident pages, it generates a hard fault.

For soft faults, the kernel maps the physical memory containing the pages to the virtual address space of the process. The kernel then marks the specific page as active. If the fault involved a write operation, the page is also marked as modified so that it will be written to backing store if it needs to be freed later.

For hard faults, the VM object's pager finds the page in the backing store or from the file on disk, depending on the type of pager. After making the appropriate adjustments to the map information, the pager moves the page into physical memory and places the page on the active list. As with a soft fault, if the fault involved a write operation, the page is marked as modified.



Copyright © 2003, 2013 Apple Inc. All Rights Reserved. Terms of Use | Privacy Policy | Updated: 2013-04-23

The NAD Team has come up with a list of honors that can possibly be earned at home during the COVID-19 shut-down.
Check it out!
El liderazgo de la División Norteamericana he creado una lista de especialidades que posiblemente se pueden desarrollar en casa durante la cuarentena del COVID-19.
¡Búsquelo aquí!
Adventist Youth Honors Answer Book | Vocational
This page contains changes which are not marked for translation.
English • ‎español

Computer
General Conference

Vocational
See also Computer - Advanced

Skill Level 1
Year of Introduction: 1986


  • 11. Describe the function of and point out the following components of a personal computer:
  • 44. Determine the following on a computer system:a. Processor speedb. Storage capacity of the hard drive.c. Memory capacity (RAM)
  • 66. List two different types of printers and explain the uses and advantages of each type.
  • 77. Explain how each of the following elements helps protect a computer system. Why is computer safety so important?

Earning this honor meets a requirement for:


1. Describe the function of and point out the following components of a personal computer:

a. CPU

CPU is an acronym that stands for 'Central Processing Unit.' This is the 'brain' behind a computer, and is where all the arithmetic, logic, and program flow is performed.

b. Memory (RAM)

Different RAM types. From top to bottom: DIP, SIPP, SIMM 30 pin, SIMM 72 pin, DIMM (168-pin), DDR DIMM (184-pin).

RAM is an acronym that stands for Random Access Memory. 'Random access' means that the contents of the memory can be accessed in any random order. The term was originally coined to differentiate it from serial memory (such as data stored on a magnetic tape). The contents of a serial memory could only be accessed sequentially. RAM is a volatile memory, which means that when the power is turned off, the information stored there is lost.

RAM can be accessed very quickly by the computer. Its contents can be both read and written. Most programs on a computer are loaded into and executed from RAM. RAM is also used as 'scratch space' where the computer stores the results of calculations.

c. Mother board

Typical Computer Motherboard

The mother board is located inside the main unit and contains the core circuitry of the computer, including the CPU. It also contains 'slots' that other circuit cards such can be plugged into to add extra functions to the computer, such as a modem, networking, video acceleration, or a television tuner. The functions provided by these add-on cards (or daughter cards) are often absorbed into the motherboard as new technology is introduced. Modems, networking, sound, graphics, hard drive controllers, and USB adapters are examples of technology introduced as add-on cards, but now commonly found on the motherboard.

d. Hard Drive

Hard drive

A hard drive is a nonvolatile data storage device. It works by the same principals as a floppy disc, except that it is much faster, has much greater storage capacity, and is usually not removable from the computer. Most hard drives consist of several aluminum platters stacked on a spindle. The platters (or disks) are coated with a material whose magnetic properties are easily detected (for reading) and changed (for writing). The computer's operating system is usually stored on the hard drive as are most of the other programs the computer runs. Data stored on a hard drive will not be destroyed if the computer is turned off.

e. External Drive

An external drive is a storage device that is connected to a computer via a USB (or other) port. The drive itself remains outside the computer. The advantage of an external drive is that it is easier to install and it can be moved from one computer to another. This feature can be used for physically transporting large amounts of data between computers, or securing the data in an off-site location.

f. Internal Drive

An internal drive is a storage device that is installed inside the computer. The advantage of an internal drive is that it takes up less space and is generally more reliable than an external drive.

g. USB

USB connector

USB stands for Universal Serial Bus. It is a convenient method of interfacing many different devices to a computer. USB devices include cameras, printers, flash memory drives, external hard drives, music players, and many others. USB ports are located on the back, front, or both sides of a computer, and sometimes even on computer monitors. A USB device is simply plugged into the port, and the computer recognizes the device and prepares it for use.

h. Optical Drive

An optical drive is a device which reads and optionally writes data to optical storage media such as CD-ROMS and DVDs.

i. Input devices

An input device is any device through which data can be provided to a computer. Input devices include, the mouse, keyboard, network card, storage devices, cameras, microphones. bar code reader (like at grocery store), iris scanner, thumb print reader, video camera, touch screen, pin pad, card readers, near field communication (bluetooth), security sensors, RFID reader, tap and go for credit cards, motion sensors, light sensors.

j. Monitor

A computer display, monitor or screen is a computer peripheral device capable of showing still or moving images generated by a computer.

Typical computer monitor

k. Keyboard

A computer keyboard is a peripheral modelled after the typewriter keyboard. Keyboards are designed for the input of text and characters, and also to control the operation of the computer. Physically, computer keyboards are an arrangement of rectangular or near-rectangular buttons, or 'keys'. Keyboards typically have characters engraved or printed on the keys; in most cases, each press of a key corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously, or in sequence; other keys do not produce any symbol, but instead affect the operation of the computer, or the keyboard itself.

Roughly 50% of all keyboard keys produce letters, numbers or signs (characters). Other keys can produce actions when pressed, and other actions are available by simultaneously pressing more than one action key.

l. Printer

A printer is a device for capturing the output of a computer on paper.

m. Mouse

A mouse is a device that is used by human operators to control a computer. It can be used to move a cursor on a screen, highlight data on the screen, 'drag and drop' files from one folder to another, control the action in a computer game, and manipulate data in many other ways.

n. Modem / Network Card

Modem stands for Modulator/Demodulator, and it a hardware device which allows computers to communicate with one another over a telephone line (or some other audio channel). A network card serves the same function except that it connects to a computer network (such as ethernet) and is much, much faster than a modem. Modems are used for 'dial-up' internet connections, and network cards are used for 'broadband' internet connections.

o. Digital Camera

A digital camera is a device which digitally captures and stores an image in the form of a photograph. Purple (nimerra) mac os. The photograph can then be transferred to a computer where it can be stored, transmitted to other computers, or digitally manipulated.

p. Scanner

A scanner is a device which is used to digitize a two-dimensional image, such as a printed photograph, a page from a book, or a store receipt. 3D scanners are now becoming common.

2. Describe the proper handling and storage techniques of disks, CDs, CDR's, DVDs, Flash/USB drives, and other equivalent optical media devices.

CD's, CDR's, and DVD's are all forms of optical media, and as such, must be protected from scratches. They are fairly impervious to water, and in fact can be cleaned with it (just be sure to completely dry them off before trying to use them). Store them in protective cases, envelopes, or some other container designed to store them.

Flash/USB drives are incredibly durable and can take a lot of punishment. But that doesn't mean they should be abused. Though they are tough, they can still be crushed or snapped. Do not open the casing, as this will expose the internal circuitry to static electricity which can damage them. Unlike the optical media described above, flash drives can be damaged by liquids.

3. Explain the difference between read-only, write once, and write-rewrite media. What are examples of each?

Read-only
Read-only media is prepared at the factory and cannot be altered by the consumer. The most prevalent examples of read-only memory today are the CD-ROM and the DVD.
Write-once
Write-once media is blank when purchased and is written by the consumer. Once it is written to, the data on it cannot be changed. An example of write-once media is the CDR (or CD-R).
Write-rewrite
Write-rewrite media can be written, erased, and rewritten by the end user. An example is the CD-RW. This type if media is generally more expensive than the CD, the DVD, or the CDR. In more modern times, the flash drive has taken the place of standard 'Write-rewrite media.

4. Determine the following on a computer system:
a. Processor speed
b. Storage capacity of the hard drive.
c. Memory capacity (RAM)

Windows

Click the 'Start' button. Then click 'My Computer' with the right mouse button, and select 'Properties'. This will bring up a window. Select the 'General' tab, and the computer will display the processor speed, memory capacity, as well as a number of other bits of information.

To find the storage capacity, click the 'Start' button and then use the left mouse button to select 'My Computer'. This will open a new window which will show all the drives on the computer. Generally, the 'C:' drive is the hard drive, so right-click on that and select 'Properties' - this will show you the drive capacity as well as how much of the drive is in use.

Be sure to pay attention to the use of the left mouse button verses the right mouse button.

Mac

Click on the 'Apple' at the top left corner of the screen. Now click on 'About This Mac'. This will bring up a window that contains the processor type and speed and how much memory the computer has. To find the storage capacity on the hard drive, click the 'More Info..' button. Now click on 'ATA' under 'Hardware'. There should be two 'ATA Bus' sections. Click on the bottom section or the one that doesn't contain anything about a CD drive. The hard drive capacity is under 'Capacity'.

Linux

At the command prompt, type the following command:

This will tell you the processor speed as well as the memory capacity. For the storage capacity, type:

This will yield an output similar to this:

This output above indicates that the computer has a single hard drive with three partitions. The first of these is the root partition which has a total capacity of 20 Gigabytes, the second is 101 Megabytes, and the third is 16.7 Gigabytes.

5. What are the advantages of increasing processor speed, hard drive storage capacity and RAM on a computer?

Increasing the processor speed of a computer will allow it to make more computations per second, thus improving its performance. Increasing the amount of RAM in a computer will also increase its performance, but for a different reason. When a computer program needs RAM, it requests it from the operating system (OS). If free memory is available, the OS assigns it to the program and all is well. If there is not enough memory to satisfy the request, the OS will copy the contents of some other program's RAM to the hard drive, and then give that to the requesting program. When the other program needs that memory again, the OS restores it from the hard drive (after writing the other program's version of the memory to the hard drive). This process is called 'swapping,' and it can really slow down a computer. However, all the programs continue to work as designed, and the computer makes maximum use of the resources available to it. Increasing RAM capacity will eliminate or reduce the amount of swapping that goes on.

Increasing the storage capacity of a computer will not make it run any faster (as increasing the processor speed and memory capacity will), but it will allow more files and programs to be stored on the computer.

6. List two different types of printers and explain the uses and advantages of each type.

Laser Printer

A laser printer is a common type of computer printer that produces high quality printing, and is able to produce both text and graphics.

An electric charge is first projected onto a revolving drum. The drum has a surface of a special plastic or garnet. Electronics drive a system that writes light onto the drum with a laser. The light causes the electrostatic charge to leak from the exposed parts of the drum. The surface of the drum passes through a bath of very fine particles of dry plastic powder, or toner. The charged parts of the drum electrostatically attract the particles of powder. The drum then deposits the powder on a piece of paper. The paper passes through a fuser, which, with heat and pressure, bonds the plastic powder to the paper.

Mac Os Download

Laser printers are the workhorse printer of the business world. They are capable of producing very high quality prints very cheaply. Although most laser printers only work in black and white, some models can also produce color prints. Because of their speed and economy, laser printers have largely replaced all other types of printers except ink jet and thermal printers.

Ink Jet Printer

Most current inkjets work by having a print cartridge with a series of tiny electrically-heated chambers. To produce an image, the printer runs a pulse of current through the heating elements. A steam explosion in the chamber forms a bubble, which propels a droplet of ink onto the paper (hence Canon's tradename for its inkjets, Bubblejet). When the bubble condenses, surplus ink is sucked back up from the printing surface. The ink's surface tension pumps another charge of ink into the chamber through a narrow channel attached to an ink reservoir.

Compared to earlier consumer-oriented printers, ink jets have a number of advantages. They are quieter in operation than impact dot matrix or daisywheel printers. They can print finer, smoother details through higher printhead resolution, and many ink jets with photorealistic-quality color printing are widely available.

The disadvantages of inkjets include flimsy print heads (prone to clogging) and expensive ink cartridges (sometimes costing US$30 – $40 or more). This typically leads value-minded consumers to consider laser printers for medium-to-high volume printer applications.

A common business model for inkjet printers involves selling the actual printer at or even below production cost, while dramatically marking up the price of the (proprietary) ink cartridges.

7. Explain how each of the following elements helps protect a computer system. Why is computer safety so important?

a. Backup of personal files

Pathfinders: Memories Mac Os 8

An important fact about modern computing is that computers eventually fail. If the hard drive on a computer fails, it may be difficult or impossible to recover the data that is stored on it. Forward-thinking computer users keep all of their important personal files backed up on external media so that when the computer fails, they still have their data.

b. Whole system image backup

It is not nearly as important to back up program files, because the program can be re-installed when the computer is repaired or replaced. However, re-installing every program that a computer user needs can be a time-consuming and frustrating process. If the whole system is backed up, it can be restored in short order.

c. Surge protection

The A/C power that feeds most businesses and households is subject to all kinds of disturbances that can disrupt or damage a computer. Lightning strikes can induce large currents in powrlines, and these translate into 'surge' voltages. The increased voltage can easily damage a computer. Most often, this affects its power supply module. A surge protector is designed to absorb these voltage surges, preventing damage to the computer.

d. Internet safety hardware/software

An unfortunate fact of modern life is that the world is filled with evil (or immature) people who think it great fun to destroy data on a stranger's computer. Some of these people are capable of 'hacking' their way into computer systems and altering files - even taking complete control of the computer. The computer can then be used to launch attacks against other computers. Sometimes this is done in order to install malicious software designed to analyze keystrokes. When the program detects that someone is engaged in online banking activities or ordering merchandise with a credit card, it springs into action, gathering account numbers and passwords which are then passed to the programmer. Once hacking was confined to a small community of immature, thoughtless programmers looking for a thrill, but it is becoming more and more an activity conducted by organized crime and rouge governments.

Firewalls and antivirus software are designed to combat these operations, but in order to be effective, they must be installed and constantly updated.

8. Write a 250-word essay or give a three-minute oral report about the history of computers. Include prominent events and personalities that are significant to the development of the computer, both hardware and software. This report should focus on the development of the personal computer, not the internet or other accessory functions related to computing.

This research should be performed by the person earning the honor, but we will provide a few names for plugging into a search engine:

Steve Wozniak and Steve Jobs are probably the most important people in the early history of personal computer hardware, as together, they formed Apple Computer which produced the first commercially viable home computer. Bill Gates and the company he founded (Microsoft) have had more influence on computer software than anyone else. Other people to know about include Brian Kernighan, Dennis Ritchie, Ken Thompson, Richard Stallman, Vint Cerf, and Linus Torvalds.

9. Spend one week charting the time you spend on a computer. List what time was spent on schoolwork, gaming, online, etc. At the end of the week, evaluate with your counselor, family, or group leader how your management of computer time relates to the Bible's instructions on stewardship of our time and resources (Romans 14:12; Psalms 31:15; Ecclesiastes 31:1-8; Ephesians 5:15-16).

So then, each of us will give an account of himself to God. - Romans 14:12, NIV

My times are in your hands; deliver me from my enemies and from those who pursue me. - Psalm 14:12, NIV

Be very careful, then, how you live—not as unwise but as wise, making the most of every opportunity, because the days are evil. - Ephesians 5:15-16, NIV.

We are responsible for how we spend our time, and God expects us to use it in His service. Ecclesiastes 3:1-8 starts out

Pathfinders: Memories Mac Os X

There is a time for everything, and a season for every activity under heaven: a time to be born and a time to die, a time to plant and a time to uproot - Ecclesiastes 3:1,2, NIV.

Likewise, there is a time to compute and a time to not compute. It is very easy to become addicted to computing, and as with all things, moderation is the key to temperance.

10. Dialogue with a long-term computer user about the advantages/disadvantages of Macs and PCs. Some questions you should ask include:
a. What operating system does each use? What are some advantages of that OS?
b. What compatibility issues do these two types of computers have in relation to data sharing and program installation?
c. What type of industries / careers tend to use each type of computer system?

With the importance of computing in today's world, it is highly likely that you know someone who could be described as 'a long-term computer user.' Perhaps a staff member in your Pathfinder club fits this description. Invite this person to attend a meeting to have this discussion. It would be a good idea to provide this person with the questions ahead of time to provide ample opportunity for preparations.

References

Pathfinders: Memories Mac Os Download

Retrieved from 'http://wiki.pathfindersonline.org/index.php?title=Adventist_Youth_Honors_Answer_Book/Vocational/Computer&oldid=285154'




broken image