11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

computer engineering 101Once a computer-based crime is detected, a systematicapproach to evidence gathering <strong>and</strong> investigation isrequired (see computer forensics). This is because evidencein computer crimes tends to be technical, intangible,<strong>and</strong> transient, <strong>and</strong> thus difficult to explain properly tojudges <strong>and</strong> juries.Individual consumers can reduce their vulnerability byensuring that they do not give out personal informationwithout verifying both the requester <strong>and</strong> the need for thedata. Use <strong>of</strong> secure Web sites for credit card transactionshas become st<strong>and</strong>ard. Generally speaking, vulnerabilityto computer crime is inversely proportional to the degree<strong>of</strong> privacy individuals have with regard to their personalinformation (see privacy in the digital age). Public concernabout privacy <strong>and</strong> security has led to recent laws <strong>and</strong>initiatives aimed at disclosure <strong>of</strong> organizations’ privacypolicy <strong>and</strong> limiting the redistribution <strong>of</strong> information oncecollected.Further ReadingBalkin, J. M. Cybercrime: Digital Cops in a Networked Environment.New York: New York University Press, 2007.CERT Coordination Center, Carnegie-Mellon University. Availableonline. URL: http://www.cert.org. Accessed August 12, 2007.Easttom, Chuck. <strong>Computer</strong> Security Fundamentals. Upper SaddleRiver, N.J.: Prentice Hall, 2005.McQuade, Sam C. Underst<strong>and</strong>ing <strong>and</strong> Managing Cybercrime. Boston:Allyn & Bacon, 2005.Mitnick, Kevin, <strong>and</strong> William L. Simon. The Art <strong>of</strong> Intrusion. NewYork: Wiley, 2005.computer engineering<strong>Computer</strong> engineering involves the design <strong>and</strong> implementation<strong>of</strong> all aspects <strong>of</strong> computer systems. It is the practicalcomplement to computer science, which focuses onthe study <strong>of</strong> the theory <strong>of</strong> the organization <strong>and</strong> processing<strong>of</strong> information (see computer science). Because hardwarerequires s<strong>of</strong>tware (particularly operating systems) in orderto be useful, computer engineering overlaps into s<strong>of</strong>twaredesign, although the latter is usually considered to be aseparate field (see s<strong>of</strong>tware engineering).To get an idea <strong>of</strong> the scope <strong>of</strong> computer engineering, considerthe range <strong>of</strong> components commonly found in today’sdesktop computers:ProcessorThe design <strong>of</strong> the microprocessor includes the number <strong>and</strong>width <strong>of</strong> registers, method <strong>of</strong> instruction processing (pipelining),the chipset (functions to be integral to the packagewith the microprocessor), the amount <strong>of</strong> cache, the connectionto memory bus, the use <strong>of</strong> multiple processors, theorder in which data will be moved <strong>and</strong> stored in memory(low or high-order byte first?), <strong>and</strong> the clock speed. (Seemicroprocessor, chipset, cache, bus, multiprocessing,memory, <strong>and</strong> clock speed.)MemoryThe design <strong>of</strong> memory includes the type (static or dynamic)<strong>and</strong> configuration <strong>of</strong> RAM, the maximum addressable memory,<strong>and</strong> the use <strong>of</strong> parity for error detection (see memory,addressing, <strong>and</strong> error correction). Besides r<strong>and</strong>omaccessmemory, other types <strong>of</strong> memory include ROM (readonlymemory) <strong>and</strong> CMOS (rewritable persistent memory).MotherboardThe motherboard is the platform <strong>and</strong> data transfer infrastructurefor the computer system. It includes the main databus <strong>and</strong> secondary buses (such as for high-speed connectionbetween the processor <strong>and</strong> video subsystem—see bus).The designer must also decide which components will beintegral to the motherboard, <strong>and</strong> which provided as addonsthrough ports <strong>of</strong> various kinds.Peripheral DevicesPeripheral devices include fixed <strong>and</strong> removable disk drives;CD <strong>and</strong> DVD-ROM drives, tape drives, scanners, printers,<strong>and</strong> modems.Device ControlEach peripheral device must have an interface circuit thatreceives comm<strong>and</strong>s from the CPU <strong>and</strong> returns data (seegraphics card).Input/Output <strong>and</strong> PortsA variety <strong>of</strong> st<strong>and</strong>ards exist for connecting external devicesto the motherboard (see parallel port, serial port, <strong>and</strong>usb). Designers <strong>of</strong> devices in turn must decide which connectionsto support.There are also a variety <strong>of</strong> input devices to be h<strong>and</strong>led,including the keyboard, mouse, joystick, track pad, graphicstablet, <strong>and</strong> so on.Of course this discussion isn’t limited to the desktop PC;similar or analogous components are also used in larger computers(see mainframe, minicomputer, <strong>and</strong> workstation).NetworkingNetworking adds another layer <strong>of</strong> complexity in controllingthe transfer <strong>of</strong> data between different computer systems,using various typologies <strong>and</strong> transport mechanisms (suchas Ethernet); interfaces to connect computers to the network;routers, hubs, <strong>and</strong> switches (see network).Other ConsiderationsIn designing all the subsystems <strong>of</strong> the modern computer <strong>and</strong>network, computer engineers must consider a variety <strong>of</strong> factors<strong>and</strong> trade<strong>of</strong>fs. Hardware devices must be designed witha form factor (size <strong>and</strong> shape) that will fit efficiently into acrowded computer case. For devices that require their ownsource <strong>of</strong> power, the capacity <strong>of</strong> the available power supply<strong>and</strong> the likely presence <strong>of</strong> other power-consuming devicesmust be taken into account. Processors <strong>and</strong> other circuitsgenerate heat, which must be dissipated. (In an increasinglyenergy-conscious world the reduction <strong>of</strong> energy consumption,such as through st<strong>and</strong>by or “hibernation” modes, isalso an important consideration—see green pc.) Heat <strong>and</strong>other forms <strong>of</strong> stress affect reliability. And in terms <strong>of</strong> how

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!