Lecture No. 4

67
CSE1720 Summer 2005 Lect 04 / 1 Lecture No. 4 Memory and its Management Operating Systems 2000 and XP

description

Lecture No. 4. Memory and its Management Operating Systems 2000 and XP. This Lecture. Yesterday we started to look at some of the ‘internals’ of PC (mainly) hardware and software - mostly at Operating System and Hardware CPU level - PowerPoint PPT Presentation

Transcript of Lecture No. 4

Page 1: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 1

Lecture No. 4Lecture No. 4

Memory and its Management Operating Systems 2000 and XP

Page 2: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 2

This LectureThis Lecture

Yesterday we started to look at some of the ‘internals’ of PC (mainly) hardware and software - mostly at Operating System and Hardware CPU level

Today, we are going to have a slightly deeper look

Page 3: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 3

Memory/Memory ManagementMemory/Memory Management

**************************Conventional memory: Up to the first 640Kb of memory. All MS-DOS based programs require conventional memory

Upper Memory Area : 384Kb above the 640Kb of conventional memory Used by System Hardware (display adapter) UNUSED parts of upper memory are called upper memory blocks (UMB’s). Used for running device drivers and memory resident programs

Personal Computer Memory: - at DOS system prompt, key in mem/c

Page 4: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 4

Memory/Memory ManagementMemory/Memory Management

Extended Memory (XMS): Beyond 1Mb ( 286,386,486) Requires an extended memory manager (HIMEM.SYS)

Windows and Windows based applications require extended memory

High Memory Area : First 64Kb of extended memory. (MS-DOS is normally loaded here. Leaves more conventional memory available)

Page 5: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 5

Memory/Memory ManagementMemory/Memory Management

Virtual Memory: Space on the system hard disk which is used by Windows as if it were ‘normal’ high speed memory

Expanded Memory (EMS): Installed on the system expanded - memory board, uses an extended memory manager.

Available in 64K blocks - EMS page frame

Slower than using extended memory.

Page 6: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 6

Memory/Memory ManagementMemory/Memory Management

Extended Memory (XMS) (2Mb)

HMA

Upper Memory Area (384Kb)Conventional Memory

(640Kb)

Expanded Memory

(EMS) (1Mb)1Mb

16,32,64,128 ... ? Mb3Mb

640Kb

Page 7: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 7

Other Storage MattersOther Storage Matters

The amount of ‘high speed main memory’ is limited.

The limiting factors are size related to the volume of data required to be stored, addressing capability and of course, cost

One of the major aims of a computer is to provide fast processing/throughput

A limiting factor is the ‘retrieval’ of data from secondary storage (disks, CD-Rom, DVD, ….)

Page 8: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 8

Other Storage Matters Other Storage Matters

However, once data in is the ‘high speed storage’ area, there are a few ways of improving process capability

One method is to have ‘Cache Memory’ -

this is a copy of data which was• retrieved from secondary storage (disk or CD Rom),• placed in Random Access memory (RAM)• retrieved from RAM for process purposes by the CPU, • AND a copy of the ‘record’ or ‘data element’ is placed in

Cache Memory.

Page 9: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 9

Cache MemoryCache Memory

If the ‘data’ is required again, the first search is to Cache Memory

There are 2 major types of Cache Memory• Internal Cache - built into the CPU chip

• External Cache - is located on SRAM chips close to the CPU on the system board

Page 10: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 10

Cache MemoryCache Memory

The pattern of search is

- 1. internal cache

- 2. external cache

- 3. main memory

and then to secondary storage (disk or CD-Rom ….)

Page 11: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 11

Memory ChipsMemory Chips

2 Basic Types

– 01. Random Access memory (RAM) (volatile)

SRAM (static RAM - refresh not necessary)

DRAM (dynamic RAM - needs refreshing - slower than SRAM)

Page 12: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 12

Memory ChipsMemory Chips

– 02. Read Only Memory (ROM) (non volatile)

Also, not able to be altered by the user (Other variations PROM, EPROM

Page 13: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 13

Memory ChipsMemory Chips

Another less obvious chip also exists:

• CMOS - Complementary metal oxide semiconductor

Requires only low power. Holds setup details - supplemented by Autoexec and Config data

Page 14: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 14

More Chip TypesMore Chip Types

DRAM - dynamic RAMFPM RAM - Fast page-mode RAMEDO RAM - Extended Data Out RAMBEDO RAM - Burst Extended-data-out RAMSDRAM - Synchronous dynamic RAMSRAM - Static Random Access MemoryAsync SRAM - Asynchronous SRAMSync SRAM - Synchronous (with the system clock)PB SRAM - PipeLine Burst SRAMVRAM - Video RamWRAM - Windows RAMSGRAM - Synchronous RAMDDR DRAM - Double Density Read RAM

Page 15: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 15

More ChipsMore Chips

• DDRSDRAM - Double Data Rate-Synchronous DRAM supports data transfers on the rising and falling edges of each clock cycle

• FPM DRAM – Fast Page Mode D Ram• PC133 SDRAM – Bus speed 133mhz• 1T-SRAM• Direct RDRAM – Read DRAM

• SDRAM is about 3 times faster than FPM RAM– And about twice as fast as BEDO DRAM

• SDRAM is replacing EDO DRAM in newer PCs

Page 16: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 16

SIMDSIMD

SIMD = Single instruction, multiple data

Mostly for multimedia

Relate to a single command which is executed on each piece of data in a set (for example, an image)

increasing/decreasing the

intensity

colour

volume of an object

or using comparator functions to determine equality/non-equality of 2 or more objects

Page 17: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 17

Travelling Around the ComputerTravelling Around the Computer

So, how does ‘data’ (in all of its various forms and meanings) get around the various devices ?

No problem

It takes a bus

So, what is a bus ?

It is an electronic path in a computer system which transmits bits - the binary digits which represents the atomic values of data

Page 18: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 18

Travelling Around the ComputerTravelling Around the Computer

There are a number of different varieties of ‘buses’

1. The Internal Bus - its function is to move data around the CPU chip

2. Data and Expansion Buses - their function is

to link the CPU and RAM

to extend the data bus and to establish links with peripherals

Page 19: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 19

Travelling Around the ComputerTravelling Around the Computer

3. Local buses - a special bus (or buses) which link peripherals requiring fast response times (display, disk, high speed local networks)

(GUI’s, Multimedia, scanners - all have high bit loads and require fast traffic lanes)

4. Universal Serial Bus - capability of linking many devices to a single or common port (such as the Zip drive, pluggable hard disk, CD-Rom)

Page 20: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 20

More on BusesMore on Buses

• PCI = Peripheral Component Interconnect (McIntosh)

• VESA = Video Electronics Standards Association

• MCA = MicroChannel Architecture (IBM PS/2)

• EISA = Extended Industry Standard Architecture

• ISA = Industry Standard Architecture

(ISA is 16 bit (binary digit). The others are 32 and 16 bit)

Page 21: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 21

Page 22: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 22

Page 23: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 25

Windows NT / 2000 / XPWindows NT / 2000 / XP

These are current microcomputer operating systems, and provide a user, like yourselves, with a graphics user interface (gui)

This interface lets you select

- an icon, which normally has a text box attached to it and which MAY initiate a program - Netscape

- a menu (and sub-menu) function or set of functions

- an application such as Word, Excel, …...

Page 24: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 26

Windows NT / 2000 / XPWindows NT / 2000 / XP

• An icon is a GUI macro - its selection causes the computer to start (or stop) a series of processes.

• These processes are supported by software, and this software is encapsulated in different types of files

Some of the common ‘active’ files are recognised by their extents:

.exe - executable .com command .bat batch

Page 25: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 27

Windows NT / 2000 / XPWindows NT / 2000 / XP

Data content file extents indicate to the ‘process’ function the way in which the data has been recorded

A Word file will have an extent of .doc

An Excel file will have an extent of .xls (or a variation)

A PowerPoint file will have an extent of .ppt

A MS Access database file will have an extent of .mdb

Other ‘data’ may be pictures or objects

Their extents can be .jpeg, .pif, .wav, gif and so on (don’t forget the html, and htm variations)

Page 26: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 28

Windows NT / 2000 / XPWindows NT / 2000 / XP

Windows NT, 2000 and XP have a ‘Registry’

- also known as ‘Intelligence’

The Registry is the database for all system information.

The registry contents can be altered - but be very careful - and if you really have to alter the Registry, back it up first

Page 27: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 29

Windows NT / 2000 / XPWindows NT / 2000 / XP

Registry editors must be used - be very, very careful !

All of the GUI administration tools serve as ‘front-ends’ to the registry and store all their data in it.

An important and powerful feature of the Registry is the ability to read in Registry settings from datafiles. (‘Active’).

Page 28: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 30

Windows NT / 2000 / XPWindows NT / 2000 / XP

There are 4 primary ‘consumers’ or ‘customers’ of the Registry

The Windows operating System

Software installed on your computer

Hardware installed on your computer

You - the user

Page 29: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 31

Windows NT / 2000 / XPWindows NT / 2000 / XP

Windows NT / 2000 and XP

• Have no Registry size restriction• Are hierarchically arranged• The Registry contains standardised values• User information is stored in HKEY_USERS keys• The Register can be remotely administered• System policies (e.g. upgrades) can be downloaded from a

central server each time a new user logs on

Page 30: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 32

Windows NT / 2000 / XPWindows NT / 2000 / XP

The Registry is a central repository for hardware-specific information which is used by the Plug and Play system components.

Windows NT/2000 and XP hold and maintain information about hardware components and devices which have been identified by processes known as ‘enumeration’ in the structure of the Registry

Adding new devices causes the system to check the existing configuration and determines what resources are available (I/O addresses,DMA channels..) so that the new device can be configured without clashing with an existing device

-- The ‘plug and play’ feature (PNP)

Page 31: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 33

Windows NT / 2000 / XPWindows NT / 2000 / XP

Virtual Device Drivers:

They are 32 bit, protected-mode drivers which manage a system resource (hardware device , software) so that more than one application can use the device at the same time

Configuration Manager :

Manages the ‘configuration’ process.

It has a number of sub-components which are directed at ‘specifics’ e.g. buses, devices

Ensures ‘no conflict’ of use of devices

Page 32: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 34

Windows NT / 2000 / XPWindows NT / 2000 / XP

Registry

Configuration Manager

Enumerator Arbitrator Device Driver

Bus Bus Bus

Device Device Device

Page 33: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 35

Windows NT / 2000 / XPWindows NT / 2000 / XP

Root

BIOS

PIC

ISA Bus Plug and CDROM

Hard DiskDisplay Controller

DMA

Parallel

NetPCMCIA Bus

Serial

Keyboard Controller

I/O

Play SCSI

DMA Direct Memory Access

SCSI Small computer system interface

Personal Computer Memory CardInternational Association

Page 34: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 36

Windows 2000 and XPWindows 2000 and XP

These have an Active Directory.

This is the repository for all information related to the network - (users, groups, devices ….)

The Lightweight Directory Access Protocol (LDAP) is also implemented in Novell Directory Services, Netscape Commerce Server, and the MS Exchange Server.

Active Directory Services Interfaces (ADSI) enables 3rd party vendors to integrate with the current major directory services on the market.

It’s getting larger and more powerful

Page 35: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 37

Windows 2000 / XPWindows 2000 / XP

Windows 2000 and XP are built around the concept of Domains

An Active Directory is structured from

Domains

Trees

Forests

Organisational Units

A ‘Domain’ contains containers and objects

A security barrier handles access to resources

‘Policies’ determine which users can do what

Page 36: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 38

Windows 2000 / XPWindows 2000 / XP

The Registry is organised into ‘branch’ and ‘leaf’ structure (if you have used Explorer you will have seen this dependency and subdependency)

The Branches are sections of the Registry (e.g. hardware registered on your PC)

The Leaves contain data such as the hardware interrupt assigned to a multimedia device (recognition pattern)

Page 37: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 39

Windows 2000 / XPWindows 2000 / XP

The Organisation Units in the Registry are

Root Keys

Subkeys

Hives

Entries

A Root Key the major organisational unit in the RegistryHKEY_CLASSES_ROOT

HKEY_CURRENT_USER

HKEY_LOCAL_MACHINE

HKEY_CURRENT_USERHKEY_USERS

Page 38: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 40

Windows 2000 / XPWindows 2000 / XP

An example of the Units

HKEY_LOCAL_MACHINE (Root Key)

HARDWARE (Sub Key)

DESCRIPTION

SYSTEM

CENTRAL PROCESSOR

FLOATING POINT PROCESSOR

SECURITY

SOFTWARE

Entries are contained at Root, Sub, and Hive level and contain the appropriate level details or data

TheHardware‘Hive’

Page 39: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 41

Windows NT / 2000 / XPWindows NT / 2000 / XP

And, a few words on Memory Paging

Demand paging virtual memory system is used - data (and code) are moved in pages from physical memory to a temporary file on disk.

When the information is required by a process, it is paged back into physical memory

The Memory Pager maps virtual addresses from the process address space to physical pages in memory

And a page ? - It’s a small block of logical memory and is either 2Kb or 4Kb.

Page 40: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 42

A Few Extra Thoughts on XPA Few Extra Thoughts on XP

It’s Physically ‘BIG’

It requires 2Gb of hard disk

It takes about 75 minutes to install

It is designed for ‘young’ high powered PC’s - less than 2 years old with a minimum of 128 Mb memory (256Mb ?)

Very stable - (no more ‘blue screens of death ?)

The taskbar and window borders are a ‘shimmering blue’

The icons are in 3D

It looks suspiciously like an Apple Mac

Lots of goodies - accommodates digital camera, MP3 music player, online chat, MSN Messenger, ..

Page 41: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 43

A Few Thoughts on XPA Few Thoughts on XP

Copy protected - one copy per person (not per device owned by that person)

It is suggested that XP should be installed on a new PC

This saves upgrading and the cost of an XP Home Edition upgrade kit

Can be upgraded from Windows 98, Me or 2000 - but NOT Windows95

Requires a minimum 300MHz processor (???)

Page 42: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 44

Windows XPWindows XP

But apart from that :

It is very robust (no stalls)

It loads quickly (much more quickly than Windows 2000) - it loads in segment mode - provided there is at least 256Mb memory.

Page 43: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 45

A Competitor to Windows - LinuxA Competitor to Windows - Linux

It is an operating system for servers

It runs on all modern computer architectures

It runs on clusters and Cray machines

It is free of licence costs

It appears to be a single, unifying platform with write-once, run anywhere capabilities

It is not co-opted or owned by a single entity, corporation or government

Support a number of graphical user interfaces

Is available from several Web sites - Linux kernel, system utilities, applications and an installer

It is known as ‘Open Source’

Page 44: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 46

Recent Events with LinuxRecent Events with Linux

• April, 2004• Westpac and the National Australia Bank are seriously

considering Open Source• The Commonwealth Bank will stay with Microsoft• The ANZ Bank ? Still Considering the Pros and Cons• Westpac and NAB are evaluating Linux on the desk top,

and are also considering open source alternatives on their back-end operations

• Possibly ATM and Teller environments• Possibly Internet banking platforms running on Linux• Telstra, NSW Roads Authority and NSW Department of

Commerce are also ‘interested parties’

Page 45: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 47

Bank Compliance Projects up to 2007Bank Compliance Projects up to 2007

• Money laundering legislation• New global accounting regulations• 2007 Basel 11 Accord deadline• Sarbanes-Oxley Act (US legislation)• Consumer concern regarding Internet Banking Security –

do you remember the increase in scams in 2003/2004 ?• E.g. customers being ‘asked’ to supply and confirm their

account numbers and passwords ?• Foreign exchange blowout ($A 360 million) – NAB• ‘Common’ Internet Banking System for Global Operations

Page 46: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 48

Moving OnMoving OnWe’ve spent some time on Windows NT/2000/XP Operating system facilities and components

And on some of the hardware

Hopefully you are more aware of the ‘insides’ of a PC - both hardware and software and of the interfaces used/required

There are a few more items to conclude this overview

Page 47: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 49

Factors Influencing ThroughputFactors Influencing Throughput

• Basic machine cycle rate • Memory size

• Instruction Cycle time

• Input/Output device transfer speeds

• Channel transfer rates

• Chip stack size

• Number of processors

• Registers : Number, size, speeds

Page 48: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 50

RegistersRegisters

These are special purpose (temporary) storage devices which are included in a computer to speed up processes

Uses of Registers

general purpose or scratch pad registers

segment registers (code, data, stack, extra)

offset registers - Instruction register

- Stack

- Base address

- Memory address

Flag register

Page 49: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 51

CPU and I/O DevicesCPU and I/O Devices

ALU

Control UnitInput Devices Output

Devices

Primary Storage Unit

CPU

Page 50: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 52

Instruction ExecutionInstruction Execution

Phase 1. INSTRUCTION CYCLE

1. Instruction fetched from PRIMARY STORAGE

Loaded into STORAGE REGISTER

2. OPERATION CODE ------> INSTRUCTION REGISTER

3. OPERANDS ------> ADDRESS REGISTERS

4. Next Instruction Set up

Setup and Execution

Page 51: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 53

Instruction ExecutionInstruction Execution

Phase 2 EXECUTION CYCLE

The actual steps are controlled by the nature of the instruction e.g. COPY, DIR, GOTO, CALC

These units would be used: • Storage Address Registers

• Arithmetic Accumulator Register

• ALU Adders

End of Process signal sent to Operating System

Page 52: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 54

EthicsEthics

and we’ll finish of this lecture with a few thoughts about

ethics

And there are some ‘case examples’ of ethics on the Web page

Page 53: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 55

EthicsEthics

• Ethics, noun

– pertaining to right or wrong in conduct• Ethical, adj

– in accordance with the rules or standards for right conduct or practice, especially the standards of a profession

– the rules of conduct recognised in a particular class of human actions

Page 54: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 56

EthicsEthics

The overriding principles are • fairness• integrity• openness• responsibility• commitment to accuracy and truth

Page 55: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 57

EthicsEthics

Members of a profession should act always for the maintenance for the community, rather than for sectional interests

This includes the exposure of hypocrisy, falsehoods or double standards

Members should seek to present fair, balanced and accurate material

Confidentiality must be protected at all costs

Page 56: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 58

EthicsEthics

Fair and honest means should be used to obtain material, including information. Misrepresentations and the user of concealed equipment or surveillance devices should be avoided

Members of an organisation should have equal opportunity to develop their skills

The employer organisation is obliged to provide a healthy and safe working environment

Page 57: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 59

EthicsEthics

Activities outside workhours may be seen to have an impact on the individual’s or the employer organisation

No person should be harassed or discriminated against on grounds of gender, colour, race, nationality, religious belief, impairment, age, height, weight, marital status, appearance or sexual preference

Managers or others with access to personal information relating to other members are required to treat such information as confidential, and not to disclose such information except in the course of discharging formal responsibilities

Page 58: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 60

EthicsEthics

• Members should not use their position to obtain private benefit for themselves or others

• Members should not be influenced by family or other personal relationships

• Members should be alert to conflict of interests which may arise and declare to a senior person or officer any real or perceived conflict of interest which arises or is foreseen

Page 59: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 61

EthicsEthics

• Members engaged in the development of software or hardware or communications or other Information Technology facility and who believe they have a interest on such development, maintenance, or installation should acknowledge such interest

• Members in doubt as to whether a conflict of interest exists should consult a senior officer

• No payment, gift or other advantage which may be seen to undermine accuracy, fairness or independence is to be accepted.

Page 60: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 62

EthicsEthics

• Other people’s material is not to be reproduced without reference and acknowledgement

• The source of material obtained form another organisation should be acknowledged

Page 61: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 63

EthicsEthics

The Australian Computer Society has this to say :

• An essential characteristic of a profession is the need for its members to abide by a Code of Ethics. The Society requires its members to subscribe to a set of values and ideals which uphold and advance the honour, dignity and effectiveness of the profession of information technology

Page 62: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 64

EthicsEthics

• In keeping with this statement, a member must

be honest, forthright and impartial

serve the community

strive to increase the competency and prestige of the profession

use special knowledge and skill for the advancement of human welfare

Page 63: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 65

Ethics - ACSEthics - ACS

• Competence (part only of the Standards of Conduct)

A member must endeavour to provide products and services which match the operational and financial needs of my clients and employers

A member must give value for money in the services and products I supply

A member must respect and protect the clients’ and employers’ proprietary interests

Page 64: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 66

Ethics - ACSEthics - ACS

• Social Implications

A member must protect and promote the health and safety of those affected by her/his work

A member must consider and respect people’s privacy which might be affected by a member’s work

A member must respect employees and refrain from treating them unfairly

The full statement of the code of ethics is available at

www.acs.org.au/national/pospaper/acs131.htm

Page 65: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 67

EthicsEthics

Acknowledgements to

– The Age Code of Conduct

– The Australian Computer Society

Page 66: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 68

Page 67: Lecture No. 4

CSE1720 Summer 2005 Lect 04 / 69

How to settle errorsHow to settle errors

Just joking - of course !