The Tao of Computing, Second Edition
 
by Henry M. Walker Chapman and Hall/CRC Press,
an imprint of Taylor & Francis Group
 

Index of Figures

This page provides links to color versions of the figures and images presented in Henry M. Walker, The Tao of Computing: A Down-to-earth Approach to Computer Fluency, Second Edition, Chapman and Hall / CRC Press Publishers, 2011.

Access to materials on this page requires JavaScript.

Except where other credits are given, copyright for this Second Edition is held by Henry M. Walker. Material for this Second Edition may not be reproduced or distributed without written permission of the copyright holder.

Chapter Index: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17
Chapter Figures Notes
Chapter 1
How are computers organized?
Overview of Figures for Chapter 1 (caution: slow load time) composite
Figure 1-1: Reading, adding, and displaying numbers ( .ai / .jpg ) sketch
Figure 1-2: A ribbon of parallel wires, with a connector at one end photograph
Figure 1-3: Diagram of multiple components connected via a bus ( .ai / .jpg ) sketch
Figure 1-4: Expansion slots, connected by parallel wires photograph
Figure 1-5: The PowerPC 603 microprocessor from Figure 1: B. Burgess et al, ''The PowerPC 603 Microprocessor'', Communications of the ACM, V. 37:5, June, 1994. p. 35. (c) 2002 ACM, Inc. Not available on this Web site.
Figure 1-6a: A ceramic casing for the PowerPC 603 photograph by Ed Dudak
Figure 1-6b: A ceramic casing for the Pentium Chip photograph
Figure 1-7: Intel i7 chip annotated photograph taken from Intel and reprinted with permission. Not available on this Web site.
Figure 1-8: A Heat Sink to Cool a Chip photograph
Figure 1-9: Looking Inside an HP Compaq 600 Pro Computer annotated photograph
Figure 1-10: A Close-up View of the Processing Chips for the HP Compaq 6000 Pro annotated photograph
Figure 1-11: An HP Compaq 6000 Pro Computer, with the DVD and Disk Drive Opened for Access annotated photograph
Figure 1-12: An HP Compaq 6000 Pro Computer, with Heat Sink Removed annotated photograph
Chapter 2
How are numbers and characters represented in a computer (and who cares)?
Overview of Figures for Chapter 2 (caution: slow load time) composite
Figure 2-1a: A Base Frequency for AM Radio Transmission produced by MatLab
Figure 2-1b: Audio Programming in Analog Form produced by MatLab
Figure 2-1c: Base AM Transmission with Amplitude from Audio Programming produced by MatLab

Figure 2-2a: A Binary Clock showing 5:19:26
photograph

Figure 2-2b: A Binary Clock
photograph

Figure 2-2c: A Binary Clock
photograph
Table 2-2: Selected Non-Latin Characters and their Unicode Equivalents ( .jpg / .html ) table
Chapter 3
How are images represented in a computer (and does it matter)?
Overview of Figures for Chapter 3 (caution: slow load time) composite
Figure 3-1: A Textual Image image by Fred Hagemeister
Figure 3-2a: Goreme, Turkey -- Original Version (1,570,786 bytes) photograph
Figure 3-2b: Goreme, Turkey -- Condensed to 128,650 bytes photograph
Figure 3-2c: Goreme, Turkey -- Condensed to 81,888 bytes photograph
Figure 3-2d: Goreme, Turkey -- Condensed to 41,057 bytes photograph
Figure 3-2e: Goreme, Turkey -- Condensed to 19,989 bytes photograph
Figure 3-3a: Dornoch, Scotland -- Original Version (1,527,973 bytes) photograph
Figure 3-3b: Dornoch, Scotland -- JPEG format condensed to 41,300 bytes photograph
Figure 3-3c: Dornoch, Scotland -- GIF format condensed to 41,088 bytes photograph
Figure 3-4a: Lybster, Scotland -- Original Version (846,686 bytes) photograph
Figure 3-4b: Lybster, Scotland -- JPEG format condensed to 41,320 bytes photograph
Figure 3-4c: Lybster, Scotland -- GIF format condensed to 41,300 bytes photograph
Figure 3-5: Picture A for Discussion Question 9
Multiple cloud-to-ground and cloud-to-cloud lightning strokes during night-time. Observed during night-time thunderstorm. (high resolution)
Credit: C. Clark, NOAA Photo Library, NOAA Central Library; OAR/ERL/National Severe Storms Laboratory (NSSL)
Public domain photo available
Figure 3-6: Picture B for Discussion Question 9
Bond Swamp National Wildlife Refuge, Georgia (high resolution)
Credit: John and Karen Hollingsworth, U.S. Fish and Wildlife Service
Public domain photo available
Figure 3-7a: Foliage -- Original Version (1,124,557 bytes) photograph
Figure 3-7b: Medium Resolution in gif format (59,001 bytes) photograph
Figure 3-7c: High Resolution in jpeg format (60,668 bytes) photograph
Figure 3-8: Picture A for Exercises 4 and 5
Armillaria spp.
Credit: Joseph O'Brien, plant pathologist, Forest Health Protection Unit, U.S.Forest Service
Public domain photo available
Figure 3-9: Picture B for Exercises 4 and 5
Noyce Science Center
photograph
Figure 3-10: Houghton County, Lake Superior, Michigan
Houghton County, Lake Superior, Michigan
Credit: Richard B. Mieremet, Senior Advisor, NOAA OSDIA
Photo dated 1997 from NOAA Photo Library, National Oceanic and Atmospheric Administration/Department of Commerce, http://www.photolib.noaa.gov/
Public domain photo available
Figure 3-11a: Library Shelves -- Original Picture (868,551 bytes) photograph
Figure 3-11b: Medium Resolution gif format (50,790 bytes) photograph
Figure 3-11c: High Resolution jpeg format (47,301 byes) photograph
Chapter 4
Where are programs and data stored?
Overview of Figures for Chapter 4 (caution: slow load time) composite
Figure 4-1: Hierarchical View of Computer Storage ( .ai / .jpg ) sketch
Figure 4-2: A Typical Disk Organization ( .ai / .jpg ) sketch
Figure 4-3: A Typical Disk Organization ( .ai / .jpg ) sketch
Figure 4-4: Read/write heads with a spinning disk, CD, or DVD ( .ai / .jpg ) sketch
Figure 4-5: Levels of Computer Memory ( .ai / .jpg ) sketch
Chapter 5
What is an operating system and what does it do?
no figures for Chapter 5
Chapter 6
What can computers do for me?
(Appendix A) Figure 6A-1: Processing steps for a simple Turing Machine ( .ai / .jpg ) sketch
(Appendix B) Figure 6B-1: Proposed Program A for Solving the Halting Problem ( .ai / .jpg ) sketch
Figure 6B-2: Program P Considered both as a Program and as Data ( .ai / .jpg ) sketch
Figure 6B-3: The Construction of N ( .ai / .jpg ) sketch
Chapter 7
What should I know about the sizes and speeds of computers?
Figure 7-1: Size of Selected Intel CPUs ( .pdf / .jpg ) graph
Figure 7-2: Air fares between selected cities in the Midwest ( .ai / .jpg )sketch
Chapter 8
How are software packages developed?
Figure 8-1: Stages in software development ( .ai / .jpg ) sketch
Figure 8-2: A Gift package for a friend (box wrapped in paper, tied with ribbon, and topped with a bow) photo
Chapter 9
How are computers connected?
Overview of Figures for Chapter 9 (caution: slow load time) composite
Figure 9-1: Five basic types of wire photograph
Figure 9-2a: RJ-11 Jacks and Sockets: Front View photograph
Figure 9-2b: RJ-11 Jacks and Sockets: Back View photograph
Figure 9-3: RJ-11 Wiring Diagram ( .ai / .jpg ) photograph
Figure 9-4: An RJ-45 Jack and Socket photograph
Figure 9-5: Sockets on the Back of an Apple Macintosh PowerBook G4 Laptop Computer photograph
Figure 9-6: A cross section for USB 2.0 (.ai / .jpg ) sketch
Figure 9-7: Star, Ethernet, and Token-ring Networks ( .ai / .jpg ) sketch
Figure 9-8: Four Local Star Networks, Connected in a Network ( .ai / .jpg ) sketch
Figure 9-9: A Hierarchy of Hubs ( .ai / .jpg ) sketch
Figure 9-10: Two Segments Connected with a Bridge ( .ai / .jpg ) sketch
Figure 9-11: A Wireless Network with 2 Portable and 2 Stationary Computers ( .ai / .jpg ) sketch
Chapter 10
How do users share computer files?
Overview of Figures for Chapter 10 (caution: slow load time) composite
Figure 10-1: Three separate computer and file systems, connected by e-mail ( .ai / .jpg ) sketch
Figure 10-2: Three file systems, together with a common file server ( .ai / .jpg ) sketch
Figure 10-3: Remote file access ( .ai / .jpg ) sketch
Figure 10-4: the RSS logo for syndication several sizes available; request for copyright permission from Mozilla yielded reference to http://www.mozilla.org/foundation/feed-icon-guidelines/ which states open terms and resolves matter
Chapter 11
When can I consider my personal data secure?
Figure 11-1a: Configuration of an individual computer ( .ai / .jpg )
Figure 11-1b: Configuration of an individual computer in the context of a storage server, Web server, and router to the Internet ( .ai / .jpg )
Chapter 12
How does the Internet work?
Overview of Figures for Chapter 12 (caution: slow load time) composite
Figure 12-1: The IP number hierarchy for computers at Grinnell College (.ai / .jpg ) sketch
Figure 12-2: Three Layers of Addresses (.ai / .jpg ) sketch
Figure 12-3: Processing Simple e-mail ( .ai / .jpg ) sketch
Figure 12-4: Processing Multimedia in e-mail ( .ai / .jpg ) sketch
Sidebar: Bellcore's Telephone Chords in the first MIME e-mail message photograph by Nathaniel Borenstein
Chapter 13
How do Web applications work?
Overview of Figures for Chapter 13 (caution: slow load time) composite
Figure 13-1: Processing an HTML page ( .ai /.jpg ) sketch
Figure 13-2: Processing a page utilizing PDF formatting instructions ( .ai / .jpg ) sketch
Figure 13-3: Formed used by the Grinnell College Mail Service screen shot courtesy of Grinnell College
(high-resolution image not available)
Figure 13-4: Processing a Web page with scripting ( .ai / .jpg ) sketch
Chapter 14
How private (or public) are Web interactions?
Overview of Figures for Chapter 14 (caution: slow load time) composite
Figure 14-1: Deciphering an Extended URL ( .ai /.jpg ) sketch
Figure 14-2: Data flow when working online, together with common vulnerabilities ( .ai / .jpg ) sketch
Chapter 15
Can everyone access computers and the Web?
Figure 15-1: Levels of computer and Internet access ( .ai / .jpg ) sketch
Chapter 16
Can I use Web-based materials in the same way as more traditional sources?
Figure 16-1: ACM Levels of Prepublication Evaluation for Published Materials ( .ai / .jpg ) sketch
Chapter 17
Can computers think (now or in the future)?
Figure 17-1: Kornhuber's Experiment (.ai / .jpg ) annotated photograph
Figure 17-2a: Training to aid machine learning ( .ai / .jpg ) sketch
Figure 17-2b: Trying Alternatives or Making Random Adjustments to aid machine learning ( .ai / .jpg ) sketch
Figure 17-2c: Gathering Data to aid machine learning ( .ai / .jpg ) sketch
Figure 17-3: Setup for the Turing Test (revision in progress) sketch from first edition


This document is available on the World Wide Web as

     http://www.cs.grinnell.edu/~walker/fluency-book-2/figures/figures.shtml


created 25 July 2003
last revised 13 Septebber 2012

Valid HTML 4.01! Valid CSS!
For more information, please contact Henry M. Walker at walker@cs.grinnell.edu.