The Tao of Computing, Second Edition | ||
by Henry M. Walker | Chapman and Hall/CRC
Press, an imprint of Taylor & Francis Group |
|
This page provides links to color versions of the figures and images presented in Henry M. Walker, The Tao of Computing: A Down-to-earth Approach to Computer Fluency, Second Edition, Chapman and Hall / CRC Press Publishers, 2011.
Access to materials on this page requires JavaScript.
Except where other credits are given, copyright for this Second Edition is held by Henry M. Walker. Material for this Second Edition may not be reproduced or distributed without written permission of the copyright holder.
Chapter Index: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17
Chapter | Figures | Notes |
---|---|---|
Chapter 1 How are computers organized? |
||
Overview of Figures for Chapter 1 (caution: slow load time) | composite | |
Figure 1-1: Reading, adding, and displaying numbers ( .ai / .jpg ) | sketch | |
Figure 1-2: A ribbon of parallel wires, with a connector at one end | photograph | |
Figure 1-3: Diagram of multiple components connected via a bus ( .ai / .jpg ) | sketch | |
Figure 1-4: Expansion slots, connected by parallel wires | photograph | |
Figure 1-5: The PowerPC 603 microprocessor | from Figure 1: B. Burgess et al, ''The PowerPC 603 Microprocessor'', Communications of the ACM, V. 37:5, June, 1994. p. 35. (c) 2002 ACM, Inc. Not available on this Web site. | |
Figure 1-6a: A ceramic casing for the PowerPC 603 | photograph by Ed Dudak | |
Figure 1-6b: A ceramic casing for the Pentium Chip | photograph | |
Figure 1-7: Intel i7 chip | annotated photograph taken from Intel and reprinted with permission. Not available on this Web site. | |
Figure 1-8: A Heat Sink to Cool a Chip | photograph | |
Figure 1-9: Looking Inside an HP Compaq 600 Pro Computer | annotated photograph | |
Figure 1-10: A Close-up View of the Processing Chips for the HP Compaq 6000 Pro | annotated photograph | |
Figure 1-11: An HP Compaq 6000 Pro Computer, with the DVD and Disk Drive Opened for Access | annotated photograph | |
Figure 1-12: An HP Compaq 6000 Pro Computer, with Heat Sink Removed | annotated photograph | |
Chapter 2 How are numbers and characters represented in a computer (and who cares)? |
Overview of Figures for Chapter 2 (caution: slow load time) | composite |
Figure 2-1a: A Base Frequency for AM Radio Transmission | produced by MatLab | |
Figure 2-1b: Audio Programming in Analog Form | produced by MatLab | |
Figure 2-1c: Base AM Transmission with Amplitude from Audio Programming | produced by MatLab | |
Figure 2-2a: A Binary Clock showing 5:19:26 | photograph | |
Figure 2-2b: A Binary Clock | photograph | |
Figure 2-2c: A Binary Clock | photograph | |
Table 2-2: Selected Non-Latin Characters and their Unicode Equivalents ( .jpg / .html ) | table | |
Chapter 3 How are images represented in a computer (and does it matter)? |
Overview of Figures for Chapter 3 (caution: slow load time) | composite |
Figure 3-1: A Textual Image | image by Fred Hagemeister | |
Figure 3-2a: Goreme, Turkey -- Original Version (1,570,786 bytes) | photograph | |
Figure 3-2b: Goreme, Turkey -- Condensed to 128,650 bytes | photograph | |
Figure 3-2c: Goreme, Turkey -- Condensed to 81,888 bytes | photograph | |
Figure 3-2d: Goreme, Turkey -- Condensed to 41,057 bytes | photograph | |
Figure 3-2e: Goreme, Turkey -- Condensed to 19,989 bytes | photograph | |
Figure 3-3a: Dornoch, Scotland -- Original Version (1,527,973 bytes) | photograph | |
Figure 3-3b: Dornoch, Scotland -- JPEG format condensed to 41,300 bytes | photograph | |
Figure 3-3c: Dornoch, Scotland -- GIF format condensed to 41,088 bytes | photograph | |
Figure 3-4a: Lybster, Scotland -- Original Version (846,686 bytes) | photograph | |
Figure 3-4b: Lybster, Scotland -- JPEG format condensed to 41,320 bytes | photograph | |
Figure 3-4c: Lybster, Scotland -- GIF format condensed to 41,300 bytes | photograph | |
Figure 3-5: Picture A for Discussion Question 9 Multiple cloud-to-ground and cloud-to-cloud lightning strokes during night-time. Observed during night-time thunderstorm. (high resolution) Credit: C. Clark, NOAA Photo Library, NOAA Central Library; OAR/ERL/National Severe Storms Laboratory (NSSL) | Public domain photo available | |
Figure 3-6: Picture B for Discussion Question 9 Bond Swamp National Wildlife Refuge, Georgia (high resolution) Credit: John and Karen Hollingsworth, U.S. Fish and Wildlife Service | Public domain photo available | |
Figure 3-7a: Foliage -- Original Version (1,124,557 bytes) | photograph | |
Figure 3-7b: Medium Resolution in gif format (59,001 bytes) | photograph | |
Figure 3-7c: High Resolution in jpeg format (60,668 bytes) | photograph | |
Figure 3-8: Picture A for Exercises 4 and 5 Armillaria spp. Credit: Joseph O'Brien, plant pathologist, Forest Health Protection Unit, U.S.Forest Service | Public domain photo available | |
Figure 3-9: Picture B for Exercises 4 and 5 Noyce Science Center | photograph | |
Figure 3-10: Houghton County, Lake Superior, Michigan
Houghton County, Lake Superior, Michigan Credit: Richard B. Mieremet, Senior Advisor, NOAA OSDIA Photo dated 1997 from NOAA Photo Library, National Oceanic and Atmospheric Administration/Department of Commerce, http://www.photolib.noaa.gov/ | Public domain photo available | |
Figure 3-11a: Library Shelves -- Original Picture (868,551 bytes) | photograph | |
Figure 3-11b: Medium Resolution gif format (50,790 bytes) | photograph | |
Figure 3-11c: High Resolution jpeg format (47,301 byes) | photograph | |
Chapter 4 Where are programs and data stored? |
||
Overview of Figures for Chapter 4 (caution: slow load time) | composite | |
Figure 4-1: Hierarchical View of Computer Storage ( .ai / .jpg ) | sketch | |
Figure 4-2: A Typical Disk Organization ( .ai / .jpg ) | sketch | |
Figure 4-3: A Typical Disk Organization ( .ai / .jpg ) | sketch | |
Figure 4-4: Read/write heads with a spinning disk, CD, or DVD ( .ai / .jpg ) | sketch | |
Figure 4-5: Levels of Computer Memory ( .ai / .jpg ) | sketch | |
Chapter 5 What is an operating system and what does it do? |
||
no figures for Chapter 5 | ||
Chapter 6 What can computers do for me? |
||
(Appendix A) | Figure 6A-1: Processing steps for a simple Turing Machine ( .ai / .jpg ) | sketch |
(Appendix B) | Figure 6B-1: Proposed Program A for Solving the Halting Problem ( .ai / .jpg ) | sketch |
Figure 6B-2: Program P Considered both as a Program and as Data ( .ai / .jpg ) | sketch | |
Figure 6B-3: The Construction of N ( .ai / .jpg ) | sketch | |
Chapter 7 What should I know about the sizes and speeds of computers? | ||
Figure 7-1: Size of Selected Intel CPUs ( .pdf / .jpg ) | graph | |
Figure 7-2: Air fares between selected cities in the Midwest ( .ai / .jpg ) | sketch | |
Chapter 8 How are software packages developed? |
||
Figure 8-1: Stages in software development ( .ai / .jpg ) | sketch | |
Figure 8-2: A Gift package for a friend (box wrapped in paper, tied with ribbon, and topped with a bow) | photo | |
Chapter 9 How are computers connected? | ||
Overview of Figures for Chapter 9 (caution: slow load time) | composite | |
Figure 9-1: Five basic types of wire | photograph | |
Figure 9-2a: RJ-11 Jacks and Sockets: Front View | photograph | |
Figure 9-2b: RJ-11 Jacks and Sockets: Back View | photograph | |
Figure 9-3: RJ-11 Wiring Diagram ( .ai / .jpg ) | photograph | |
Figure 9-4: An RJ-45 Jack and Socket | photograph | |
Figure 9-5: Sockets on the Back of an Apple Macintosh PowerBook G4 Laptop Computer | photograph | |
Figure 9-6: A cross section for USB 2.0 (.ai / .jpg ) | sketch | |
Figure 9-7: Star, Ethernet, and Token-ring Networks ( .ai / .jpg ) | sketch | |
Figure 9-8: Four Local Star Networks, Connected in a Network ( .ai / .jpg ) | sketch | |
Figure 9-9: A Hierarchy of Hubs ( .ai / .jpg ) | sketch | |
Figure 9-10: Two Segments Connected with a Bridge ( .ai / .jpg ) | sketch | |
Figure 9-11: A Wireless Network with 2 Portable and 2 Stationary Computers ( .ai / .jpg ) | sketch | |
Chapter 10 How do users share computer files? |
||
Overview of Figures for Chapter 10 (caution: slow load time) | composite | |
Figure 10-1: Three separate computer and file systems, connected by e-mail ( .ai / .jpg ) | sketch | |
Figure 10-2: Three file systems, together with a common file server ( .ai / .jpg ) | sketch | |
Figure 10-3: Remote file access ( .ai / .jpg ) | sketch | |
Figure 10-4: the RSS logo for syndication | several sizes available; request for copyright permission from Mozilla yielded reference to http://www.mozilla.org/foundation/feed-icon-guidelines/ which states open terms and resolves matter | |
Chapter 11 When can I consider my personal data secure? | ||
Figure 11-1a: Configuration of an individual computer ( .ai / .jpg ) | ||
Figure 11-1b: Configuration of an individual computer in the context of a storage server, Web server, and router to the Internet ( .ai / .jpg ) | ||
Chapter 12 How does the Internet work? | ||
Overview of Figures for Chapter 12 (caution: slow load time) | composite | |
Figure 12-1: The IP number hierarchy for computers at Grinnell College (.ai / .jpg ) | sketch | |
Figure 12-2: Three Layers of Addresses (.ai / .jpg ) | sketch | |
Figure 12-3: Processing Simple e-mail ( .ai / .jpg ) | sketch | |
Figure 12-4: Processing Multimedia in e-mail ( .ai / .jpg ) | sketch | |
Sidebar: Bellcore's Telephone Chords in the first MIME e-mail message | photograph by Nathaniel Borenstein | |
Chapter 13 How do Web applications work? | ||
Overview of Figures for Chapter 13 (caution: slow load time) | composite | |
Figure 13-1: Processing an HTML page ( .ai /.jpg ) | sketch | |
Figure 13-2: Processing a page utilizing PDF formatting instructions ( .ai / .jpg ) | sketch | |
Figure 13-3: Formed used by the Grinnell College Mail Service | screen shot courtesy of Grinnell College (high-resolution image not available) | |
Figure 13-4: Processing a Web page with scripting ( .ai / .jpg ) | sketch | |
Chapter 14 How private (or public) are Web interactions? | ||
Overview of Figures for Chapter 14 (caution: slow load time) | composite | |
Figure 14-1: Deciphering an Extended URL ( .ai /.jpg ) | sketch | |
Figure 14-2: Data flow when working online, together with common vulnerabilities ( .ai / .jpg ) | sketch | |
Chapter 15 Can everyone access computers and the Web? | ||
Figure 15-1: Levels of computer and Internet access ( .ai / .jpg ) | sketch | |
Chapter 16 Can I use Web-based materials in the same way as more traditional sources? | ||
Figure 16-1: ACM Levels of Prepublication Evaluation for Published Materials ( .ai / .jpg ) | sketch | |
Chapter 17 Can computers think (now or in the future)? | ||
Figure 17-1: Kornhuber's Experiment (.ai / .jpg ) | annotated photograph | |
Figure 17-2a: Training to aid machine learning ( .ai / .jpg ) | sketch | |
Figure 17-2b: Trying Alternatives or Making Random Adjustments to aid machine learning ( .ai / .jpg ) | sketch | |
Figure 17-2c: Gathering Data to aid machine learning ( .ai / .jpg ) | sketch | |
Figure 17-3: Setup for the Turing Test (revision in progress) | sketch from first edition |
This document is available on the World Wide Web as
http://www.cs.grinnell.edu/~walker/fluency-book-2/figures/figures.shtml
created 25 July 2003 last revised 13 Septebber 2012
|
![]() ![]() |
For more information, please contact Henry M. Walker at walker@cs.grinnell.edu. |