วันจันทร์ที่ 29 พฤศจิกายน พ.ศ. 2553


How Do Web Search Engines Work

Search engines are the key to finding specific information on the vast expanse of the World Wide Web. Without sophisticated search engines, it would be virtually impossible to locate anything on the Web without knowing a specific URL. But do you know how search engines work? And do you know what makes some search engines more effective than others?
When people use the term search engine in relation to the Web, they are usually referring to the actual search forms that searches through databases of HTML documents, initially gathered by a robot.
There are basically three types of search engines: Those that are powered by robots (called crawlers; ants or spiders) and those that are powered by human submissions; and those that are a hybrid of the two.
Opportunity vs. Risk : 
Crawler-based search engines are those that use automated software agents (called crawlers) that visit a Web site, read the information on the actual site, read the site's meta tags and also follow the links that the site connects to performing indexing on all linked Web sites as well. The crawler returns all that information back to a central depository, where the data is indexed. The crawler will periodically return to the sites to check for any information that has changed. The frequency with which this happens is determined by the administrators of the search engine.
Human-powered search engines rely on humans to submit information that is subsequently indexed and catalogued. Only information that is submitted is put into the index.

In both cases, when you query a search engine to locate information, you're actually searching through the index that the search engine has created —you are not actually searching the Web. These indices are giant databases of information that is collected and stored and subsequently searched. This explains why sometimes a search on a commercial search engine, such as Yahoo! or Google, will return results that are, in fact, dead links. Since the search results are based on the index, if the index hasn't been updated since a Web page became invalid the search engine treats the page as still an active link even though it no longer is. It will remain that way until the index is updated.
So why will the same search on different search engines produce different results? Part of the answer to that question is because not all indices are going to be exactly the same. It depends on what the spiders find or what the humans submitted. But more important, not every search engine uses the same algorithm to search through the indices. The algorithm is what the search engines use to determine the relevance of the information in the index to what the user is searching for.
One of the elements that a search engine algorithm scans for is the frequency and location of keywords on a Web page. Those with higher frequency are typically considered more relevant. But search engine technology is becoming sophisticated in its attempt to discourage what is known as keyword stuffing, or spamdexing.
Another common element that algorithms analyze is the way that pages link to other pages in the Web. By analyzing how pages link to each other, an engine can both determine what a page is about (if the keywords of the linked pages are similar to the keywords on the original page) and whether that page is considered "important" and deserving of a boost in ranking. Just as the technology is becoming increasingly sophisticated to ignore keyword stuffing, it is also becoming more savvy to Web masters who build artificial links into their sites in order to build an artificial ranking.
Did You Know...
The first tool for searching the Internet, created in 1990, was called "Archie". It downloaded directory listings of all files located on public anonymous FTP servers; creating a searchable database of filenames. A year later "Gopher" was created. It indexed plain text documents. "Veronica" and "Jughead" came along to search Gopher's index systems. The first actual Web search engine was developed by Matthew Gray in 1993 and was called "Wandex". [Source ]
Key Terms To Understanding Web Search Engines
spider trap
A condition of dynamic Web sites in which a search engine’s spider becomes trapped in an endless loop of code.
search engine
A program that searches documents for specified keywords and returns a list of the documents where the keywords were found.
meta tag
A special HTML tag that provides information about a Web page.
deep link
A hyperlink either on a Web page or in the results of a search engine query to a page on a Web site other than the site’s home page.
robot
A program that runs automatically without human intervention.

Activities at Sarawittaya School 29/11/2010


Activities at Sarawittaya School

Please indebtify the difference between the library resources for school students and university students?

        content of the library materail what all contents for school student is base on need of subject but the library in university is more content that the university library .

Please indentify reading activities for school and university? sha ll it be the same or difference?

        some I was the school student before continue to university student so all retivities for is sanething.

What do you like most about the school library ?

        - Enviroment nice dicoration nice  space
        - Equipment internet service mini movie
        - Book have many kind of book

What do you suggest for improvement ?

          Everything in the library is perfect no need to improve.

Rubric 29/11/2010

Evaluation Rubric:

   

1.   CASE STUDY                       

      LEVEL 4
       LEVEL 3
        LEVEL 2
     LEVEL 1
Context and Background Information
The episode is clearly situated with the appropriate details e.g. grade level, subject being taught etc.
The episode is situated with most of the appropriate details
The episode has few of the appropriate details
No context or background information
Content
Incidents are interesting and realistically portrayed
Incidents are interesting but not realistically portrayed
Incidents are realistically portrayed but not interesting.
Incidents are neither interesting, nor realistically portrayed.
Writing Skills
Writing is totally free of errors

Report of the episode is very concise
  There are occasional errors.


Report could be tightened a little
There are more than occasional errors

 Report could be tightened quite a lot
 Errors are frequent 


Report of the episode is extremely long-winded.
Format
Format is appropriate and enhances the understanding of the critical episode in a creative and dramatic manner throughout the case
Format is appropriate and enhances the understanding of the critical episode in dramatic manner for most the case
Format is appropriate and enhances the understanding of the critical episode some of the time
Format is appropriate but seldom enhances the understanding of the critical episode



2.   PRESENTATION


      LEVEL 4
     LEVEL 3
      LEVEL 2
     LEVEL 1

Delivery and Enthusiasm

Very clear and concise flow of ideas.

Demonstrates passionate interest in the topic and engagement with the class.
Clear flow of ideas


Demonstrates interest in topic and engagement with the class.
Most ideas flow but focus is lost at times

Limited evidence of interest in and engagement with the topic
Hard to follow the flow of ideas.

Lack of enthusiasm and interest.

Visuals
Visuals augmented and extended  comprehension of the issues in unique ways
Use of visuals related to the material
Limited use of visuals loosely related to the material
No use of visuals. 
Staging
Uses stage effects, such as props, costumes, sound effects, in a unique and dramatic manner that enhances the understanding of the issues in the case study
Uses stage effects, such as props, costumes, sound effects, in an effective manner to extend understanding of the issues in the case study
Limited use of stage effects, and/or used in a manner that did not enhance the understanding of the issues in the case study.
No use of stage effects
Involvement of the class:
-Questions
-Generating discussion
-Activities
Excellent and salient discussion points that elucidated material to develop deep understanding

Appropriate and imaginative activities used to extend understanding in a creative manner
Questions and discussion addressed important information that developed understanding

Appropriate activities used to clarify understanding
Questions and discussion addressed surface features of the topic

Limited use of activities to clarify understanding
 Little or no attempt to engage the class in learning
Response to Class Queries




Excellent response to student comments and discussion with appropriate content supported by theory/research
Good response to class questions and discussion with some connection made to theory/research
Satisfactory response to class questions and discussion with limited reference to theory and research
Limited response to questions and discussion with no reference to theory/research
                      


source

Knowledge Manament 29/11/2010

Knowledge Management

What is the management?   
       Management in all business areas and organizational activities are the acts of getting people together to accomplish desired goals and objectives efficiently and effectively. Management comprises planning, organizing, staffing, leading or directing, and controlling an organization (a group of one or more people or entities) or effort for the purpose of accomplishing a goal. Resourcing encompasses the deployment and manipulation of human resources, financial resources, technological resources, and natural resources.


What is Knowledge management?
      Knowledge Management is the collection of processes that govern the creation, dissemination, and utilization of knowledge. In one form or another, knowledge management has been around for a very long time. Practitioners have included philosophers, priests, teachers, politicians, scribes, Liberians, etc.


What is information system?
      An information system  is any combination of information technology and people's activities using that technology to support operations, management, and decision-making.] In a very broad sense, the term information system is frequently used to refer to the interaction between people, algorithmic processes, data and technology. In this sense, the term is used to refer not only to the information and communication technology  an organization uses, but also to the way in which people interact with this technology in support of business processes


What are the component of information system?
      The main components of information systems are computer hardware and software, databases,
5 COMPONENTS OF INFORMATION SYSTEM:
1. IT i.e. hardware and software
2. Data/Information
3. Procedures/Policies
4. People
5. Purpose
6. Communication Networks

Why do you need  apply the knowledge management process in our business?    
      Many organizations are now in the throes of implementing knowledge management strategies. However, like many other ground-breaking initiatives, success is often elusive. This workshop is primarily aimed at knowledge managers and knowledge management teams, taking them step by step through the key stages of the implementation of knowledge-based strategies. It is also beneficial for any senior manager, especially R&D, marketing, and business development manager, who wants to use better knowledge management as a key to improved business performance.


Copyright 29/11/2010


Monday, November 8, 2010

Copyright

1. What is the copyright?

Answer: Copyright is a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The exclusive rights are however balanced for public interest purposes with limitations and exceptions such as fair dealing and fair use.

2. What is fair use?

Answer: Fair use, a limitation and exception to the exclusive right granted by copyright law to the author of a creative work, is a doctrine in United States copyright  that allows limited use of copyrighted material without requiring permission from the rights holders. For example, such as commentary, criticism, news reporting, research, teaching, library archiving and scholarship.

3. What is patent?

Answer:  A patent  is a set of exclusive rights granted by a state (national government) to an inventor or their assignees for a limited period of time in exchange for a public disclosure of an invention. For example, such as  the procedure for granting patents, the requirements placed on the patented, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements.

4. Why some inventions can not be copyrights?

Answer: Because the several categories of material are generally not eligible for copyright protection, such as works that have not been fixed in a tangible form of expression.



 Sourse         

วันจันทร์ที่ 4 ตุลาคม พ.ศ. 2553

How does the internet work? 3/10/10

1.What is the internet?

Visualization of the various routes through a portion of the Internet. From 'The Opte Project'
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.
Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet. Newspaper, book and other print publishing are having to adapt to Web sites and blogging. The Internet has enabled or accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries.
The origins of the Internet reach back to the 1960s with both private and United States military research into robust, fault-tolerant, and distributed computer networks. The funding of a new U.S. backbone by the National Science Foundation, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The commercialization of what was by then an international network in the mid 1990s resulted in its popularization and incorporation into virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population used the services of the Internet.
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.

source

2.what is the Internet Protocol?

The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.
Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connection-oriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred to as TCP/IP.
The first major version of IP, now referred to as Internet Protocol Version 4 (IPv4) is the dominant protocol of the Internet, although the successor, Internet Protocol Version 6 (IPv6) is in active, growing deployment worldwide.



3.what is the OSI model?

The Internet Layer of the TCP/IP model is often compared directly with the Network Layer (Layer 3) in the Open Systems Interconnection (OSI) protocol stack. Although they have some overlap, these layering models represent different classification methods. In particular, the allowed characteristics of protocols (e.g., whether they are connection-oriented or connection-less) placed in these layers are different between the models. OSI's Network Layer is a "catch-all" layer for all protocols that facilitate network functionality. The Internet Layer, on the other hand, is specifically a suite of protocols that facilitate internetworking using the Internet Protocol.
Because of this, the OSI Network Layer is often[where?] described to include protocols such as the Address Resolution Protocol (ARP) which was placed in Link Layer by the original TCP/IP architects (RFC 1122, RFC 1123).
Strict comparison between the TCP/IP model and the OSI model should be avoided. Layering in TCP/IP is not a principal design criterion and is in general considered to be harmful (RFC 3439, section 3: "Layering Considered Harmful").
Despite clear primary references (see References below) and normative standards documents the Internet Layer is still sometimes improperly called network layer, in analogy to the OSI model.

source

4.what is the Internet Infrastructure?

The Internet is a global system of interconnected computer network s that use the ... (WWW) and the infrastructure to support electronic mail . ... Cloud infrastructure services, also known as "Infrastructure as a Service (IaaS)", delivers computer infrastructure - typically a platform virtualization environment - as a service. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such services on a utility computing basis and amount of resources consumed (and therefore the cost) will typically reflect the level of activity. IaaS evolved from virtual private server offerings.[55]


5.what is Domain Names?

domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the Domain Name System (DNS).
Domain names are used in various networking contexts and application-specific naming and addressing purposes. They are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, run web sites, or create other publicly accessible Internet resources. The registration of these domain names is usually administered by domain name registrars who sell their services to the public.
Individual Internet host computers use domain names as host identifiers, or hostnames. Hostnames are the leaf labels in the domain name system usually without further subordinate domain name space. Hostnames appear as a component in Uniform Resource Locators (URLs) for Internet resources such as web sites (e.g., en.wikipedia.org).
Domain names are also used as simple identification labels to indicate ownership or control of a resource. Such examples are the realm identifiers used in the Session Initiation Protocol (SIP), the DomainKeys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).
An important purpose of domain names is to provide easily recognizable and memorizable names to numerically addressed Internet resources. This abstraction allows any resource (e.g., website) to be moved to a different physical location in the address topology of the network, globally or locally in an intranet. Such a move usually requires changing the IP address of a resource and the corresponding translation of this IP address to and from its domain name.
Domain names are often referred to simply as domains and domain name registrants are frequently referred to as domain owners, although domain name registration with a registrar does not confer any legal ownership of the domain name, only an exclusive right of use.
This article primarily discusses the group of domain names that are offered by domain name registrars for registration by the public. The Domain Name System article discusses the technical facilities and infrastructure of the domain name space and the hostname article deals with specific information about the use of domain names as identifiers of network hosts

source


6.What is world Wide Web? And its services?

World Wide Web

The Web's historic logo designed by Robert Cailliau
InventorSir Tim Berners-Lee[1]
Launch year1990
CompanyCERN
Available?Worldwide

The World Wide Web, abbreviated as WWW and commonly known as the Web, is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them by using hyperlinks. Using concepts from earlier hypertext systems, English engineer and computer scientist Sir Tim Berners-Lee, now the Director of the World Wide Web Consortium, wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At CERN in Geneva, Switzerland, Berners-Lee and Belgian computer scientist Robert Cailliau proposed in 1990 to use "HyperText [...] to link and access information of various kinds as a web of nodes in which the user can browse at will",[2] and publicly introduced the project in December.[3]
"The World-Wide Web (W3) was developed to be a pool of human knowledge, and human culture, which would allow collaborators in remote sites to share their ideas and all aspects of a common project."


And
  • service - work done by one person or group that benefits another; "budget separately for goods and services"

  • service - an act of help or assistance; "he did them a service"

  • service - the act of public worship following prescribed rules; "the Sunday service"

  • service - a company or agency that performs a public service; subject to government regulation

  • service - employment in or work for another; "he retired after 30 years of service"

  • military service: a force that is a branch of the armed forces

  • service - Canadian writer (born in England) who wrote about life in the Yukon Territory (1874-1958)

  • service - avail: a means of serving; "of no avail"; "there's no help for it"

  • service - tableware consisting of a complete set of articles (silver or dishware) for use at table

  • service - servicing: the act of mating by male animals; "the bull was worth good money in servicing fees"

  • service - (law) the acts performed by an English feudal tenant for the benefit of his lord which formed the consideration for the property granted to him

  • service - serve: (sports) a stroke that puts the ball in play; "his powerful serves won the game"

  • service - be used by; as of a utility; "The sewage plant served the neighboring communities"; "The garage served to shelter his horses"


  • source


    7.How many Internet users in Thailand?

    As of 2008, there were 16,100,000 Internet users in Thailand.[1]
    Broadband Internet is readily available in major cities and towns, but is still to be sought after in smaller villages and in the countryside. As the statistics have shown, the majority of Internet users in Thailand still rely on dial-up access. TOT operates a nationwide local rate number, 1222, allowing dialing to most Internet service providers. Dial-up prepaid Internet packs can be readily bought in convenience stores and other places. Subscribers of fixed telephone lines by True Corporation have access to dial up Internet by dialing a certain number and then being billed on their normal telephone bill.
    The majority of broadband Internet access uses Asymmetric Digital Subscriber Line (ADSL). Some areas are covered by Cable Modems and G.shdsl. Consumer broadband Internet bandwidth ranges from 2 Mbit/s to 16 Mbit/s. Medium and large businesses use Leased Lines or Ethernet Internet/MPLS where fiber optic cables link many office buildings in the central business district areas such as Sukhumvit, Silom and Sathorn areas to the Thailand Internet backbone. Universities have access to fast Internet access, including the Trans-Eurasia Information Network (TEIN2) research network.
    A 3G UMTS/HSDPA network was launched in Bangkok and vicinity in December 2009 with speeds up to 7.2 Mbit/s on the 2100 MHz band. Major mobile network operators in Thailand are testing their 3G networks in limited urban areas on the 850 MHz and 900 MHz bands. The National Telecommunications Commission (NTC) has plans to auction out 4 further licenses to operate 3G UMTS/HSDPA networks on the 2100 MHz spectrum in 2010. A 3G CDMA network with speeds up to 3.1Mbit/s is available in 51 provinces nationwide.
    There are initiatives to offer mainstream FTTH (Fiber to the Home) providing bandwidth of up to 100 Mbit/s bundled with IPTV and VoIP. FTTH with speeds up to 30mbps is available in limited areas in Phuket.
    Thailand saw a rapid growth in the number of broadband users in 2005 with the initiation of unmetered broadband in 2004.[2]
    There are 1,116,000 (2008) Internet hosts in Thailand being the highest in South East Asia.[3]

    source

    วันจันทร์ที่ 27 กันยายน พ.ศ. 2553

    Students Wars

    Student Wars

    Nopprarat Maneetat (Get)
    53055304
    Watcharaphon Milap (Soybean)
    53010430


    IBC 101
    Access to Library and Information


    27 September 2010


    Summary

    Thai student fighting and destroy property of society which they doesn’t care or even worry what the society think of them. The shooting and stabbing happen nearly every day occurring showing to the public society. Many students from each college had been hurt and kill by another college. Many government property such as public transport had been wreak and damage by these student who doesn’t care what did they do to other people.


    Table of Content


    Abstract/ Executive Summary                    Page 1

    Table of Content

    Introduction                                                  Page 3

    Discussion                                                      Page 4

    Conclusions                                                   Page 5

    Recommendation                                                Page6

    Reference                                                      Page 7


    Introduction

    A nine year old Thai student from high school had been accident wounded and killed straight away. The news had been on air thought out nation television to public and every newspaper has been printed. Most of the parent of Thai society had been shocked with new headline that a young boy who is innocent and no idea what is happening had been wounded by a college student just fighting over for no reason. The principals from the boy high school were called in to Parliament twice for sessions on how to stop the violence. Gang violence has plagued schools for years, mostly at the country’s 835 vocational schools which cater later largely to the children of the working class such as taxi driver, security guard and factory workers. Police say there were 900 reported incidents in Bangkok in the first half of this year.





    Discussion

    This problem has been brought up for the government to discussion and tries to find a solution for college and public around the area. So many people are scare and worry; what would happen to anyone or any children, would this incident happen again?

    A problem of this college has been going on for many generations which are no method to end. Many people are terrifying the student will hurt them one day. Many nations saw the incident but they can not do anything or help the person that is being harm. If anyone came to help the individual that person will get hurt, so most people just observe and feel depressing.

    Many bus drivers wouldn’t go to pick up any of those college students because they’re terrified if one day they will get gunshot. There is no way to protect yourself because doesn’t know went this incident will occur. The student doesn’t intend to hurt anyone around them but sometime accident happens.




    Conclusions

    The problem doesn’t seem so big but it is a biggest problem right now for Thai society. One person can not do anything much and people could do anything at all. Is better for government and principles of the college to find a solution for everyone including public and make sure no one will get hurt by their students. The government should look into more way to find the problem and the student for these colleges. 




    References

    The Nation Newspaper on Monday, September 27, 2010

    วันจันทร์ที่ 20 กันยายน พ.ศ. 2553

    Ex5.Online catalog and database

    1.Can you identify the library website,opac,library database?A.Library website (define)
    Ans. It's a website that allows you to access to any books in the library online.
    B.Opac
    Ans. it's online public access catolog
    C.library database
    Ans.It's an online resource that the library subscribes to that contains articles and information from print sources such as magazines,newspapers,journal,and reference books.

    2.List 5 PDF files of articles you search from Google.A.Strategic Content manangement
    B. The look that says Book
    C.Good help is hard to Find
    D.apps vs the web
    E.No one nos: Learning to say no to Bad Ideas

    3.What's Abstract?Because on-line search databases typically contain only abstracts, it is vital to write a complete but concise description of your work to entice potential readers into obtaining a copy of the full paper. This article describes how to write a good computer architecture abstract for both conference and journal papers. Writers should follow a checklist consisting of: motivation, problem statement, approach, results, and conclusions. Following this checklist should increase the chance of people taking the time to obtain and read your complete paper.

    4.What's a full text article?In computerized databases, the complete article rather than just a citation or abstract. In LIAS databases, move from the record screen to the full text of an article by entering the command DIT. A full-text article in LIAS can be printed, sent to your email address, or saved to disk.

    5.What's your techique (s) when you're doing your homework or assignment?I often use search engine such as Google to help me figure out the methods or results for my homeworks.

    Exercise 5

    1.can you identify the library website ,OPAC,library database?

    -Library is website you can search for information wnat to know about anything or the database from the book but this time approximately people like to user Internet more than search from the book.
    OPAC is Online Public Access Catalogue.  Using OPAC you will be able to find the information about the Library collection.  You can search the documents by entering author, title or keyword in the query line.is Online Public Access Catalogue.  Using OPAC you will be able to find the information about the Library collection.  You can search the documents by entering author, title or keyword in the query line.
     
     
     

    Exercise 4 ------Reference sources------20/09/2010

    1. Where can you find information about Nobel Prize? Who get the Nobel Prize this year?
       i can find the data about the Noble Prize from website on Google.


    -Who get the Nobel Prize this year?
    Charles K. Kao thumb picture
    The Nobel Prize in Physics
    Charles K. Kao "for groundbreaking achievements concerning the transmission of light in fibers for optical communication"
    Willard S. Boyle thumb pictureGeorge E. Smith thumb picture
    The Nobel Prize in Physics
    Willard S. Boyle and George E. Smith "for the invention of an imaging semiconductor circuit – the CCD sensor"
    Venkatraman Ramakrishnan thumb pictureThomas A. Steitz thumb pictureAda E. Yonath thumb picture
    The Nobel Prize in Chemistry
    Venkatraman Ramakrishnan, Thomas A. Steitz and Ada E. Yonath "for studies of the structure and function of the ribosome"
    Elizabeth H. Blackburn thumb pictureCarol W. Greider thumb pictureJack W. Szostak thumb picture
    The Nobel Prize in Physiology or Medicine
    Elizabeth H. Blackburn, Carol W. Greider and Jack W. Szostak "for the discovery of how chromosomes are protected by telomeres and the enzyme telomerase"
    Herta Müller thumb picture
    The Nobel Prize in Literature
    Herta Müller "who, with the concentration of poetry and the frankness of prose, depicts the landscape of the dispossessed"
    Barack H. Obama thumb picture
    The Nobel Peace Prize
    Barack H. Obama "for his extraordinary efforts to strengthen international diplomacy and cooperation between peoples"
    Elinor Ostrom thumb picture
    The Prize in Economic Sciences
    Elinor Ostrom "for her analysis of economic governance, especially the commons"
    Oliver E. Williamson thumb picture
    The Prize in Economic Sciences
    Oliver E. Williamson "for his analysis of economic governance, especially the boundaries of the firm"
     
     
     
     
    2.Go to Encyclopedia Online at htth:library.spu.ac.th Search for the history of automobiles or computer summarize the information you get
     

    In The Beginning…

    The history of computers starts out about 2000 years ago, at the birth of the abacus, a wooden rack holding two horizontal wires with beads strung on them. When these beads are moved around, according to programming rules memorized by the user, all regular arithmetic problems can be done. Another important invention around the same time was the Astrolabe, used for navigation. Blaise Pascal is usually credited for building the first digital computer in 1642. It added numbers entered with dials and was made to help his father, a tax collector. In 1671, Gottfried Wilhelm von Leibniz invented a computer that was built in 1694. It could add, and, after changing some things around, multiply. Leibniz invented a special stepped gear mechanism for introducing the addend digits, and this is still being used. The prototypes made by Pascal and Leibniz were not used in many places, and considered weird until a little more than a century later, when Thomas of Colmar (A.K.A. Charles Xavier Thomas) created the first successful mechanical calculator that could add, subtract, multiply, and divide. A lot of improved desktop calculators by many inventors followed, so that by about 1890, the range of improvements included:
    • Accumulation of partial results
    • Storage and automatic reentry of past results (A memory function)
    • Printing of the results
    Each of these required manual installation. These improvements were mainly made for commercial users, and not for the needs of science.
     

    Electronic Digital Computers

    ImageThe start of World War II produced a large need for computer capacity, especially for the military. New weapons were made for which trajectory tables and other essential data were needed. In 1942, John P. Eckert, John W. Mauchly (left), and their associates at the Moore school of Electrical Engineering of University of Pennsylvania decided to build a high – speed electronic computer to do the job. This machine became known as ENIAC (Electrical Numerical Integrator And Calculator) The size of ENIAC‘s numerical “word” was 10 decimal digits, and it could multiply two of these numbers at a rate of 300 per second, by finding the value of each product from a multiplication table stored in its memory. ENIAC was therefore about 1,000 times faster then the previous generation of relay computers. ENIAC used 18,000 vacuum tubes, about 1,800 square feet of floor space, and consumed about 180,000 watts of electrical power. It had punched card I/O, 1 multiplier, 1 divider/square rooter, and 20 adders using decimal ring counters, which served as adders and also as quick-access (.0002 seconds) read-write register storage. The executable instructions making up a program were embodied in the separate “units” of ENIAC, which were plugged together to form a “route” for the flow of information. ImageThese connections had to be redone after each computation, together with presetting function tables and switches. This “wire your own” technique was inconvenient (for obvious reasons), and with only some latitude could ENIAC be considered programmable. It was, however, efficient in handling the particular programs for which it had been designed. ENIAC is commonly accepted as the first successful high – speed electronic digital computer (EDC) and was used from 1946 to 1955. A controversy developed in 1971, however, over the patentability of ENIAC‘s basic digital concepts, the claim being made that another physicist, John V. Atanasoff (left) had already used basically the same ideas in a simpler vacuum – tube device he had built in the 1930′s while at Iowa State College. In 1973 the courts found in favor of the company using the Atanasoff claim.
     
     

    The Modern Stored Program EDC

    Image Fascinated by the success of ENIAC, the mathematician John Von Neumann (left) undertook, in 1945, an abstract study of computation that showed that a computer should have a very simple, fixed physical structure, and yet be able to execute any kind of computation by means of a proper programmed control without the need for any change in the unit itself. Von Neumann contributed a new awareness of how practical, yet fast computers should be organized and built. These ideas, usually referred to as the stored – program technique, became essential for future generations of high – speed digital computers and were universally adopted. The Stored – Program technique involves many features of computer design and function besides the one that it is named after. In combination, these features make very – high – speed operation attainable. A glimpse may be provided by considering what 1,000 operations per second means. If each instruction in a job program were used once in consecutive order, no human programmer could generate enough instruction to keep the computer busy. Arrangements must be made, therefore, for parts of the job program (called subroutines) to be used repeatedly in a manner that depends on the way the computation goes. Also, it would clearly be helpful if instructions could be changed if needed during a computation to make them behave differently. Von Neumann met these two needs by making a special type of machine instruction, called a Conditional control transfer – which allowed the program sequence to be stopped and started again at any point – and by storing all instruction programs together with data in the same memory unit, so that, when needed, instructions could be arithmetically changed in the same way as data. As a result of these techniques, computing and programming became much faster, more flexible, and more efficient with work. Regularly used subroutines did not have to be reprogrammed for each new program, but could be kept in “libraries” and read into memory only when needed. Thus, much of a given program could be assembled from the subroutine library. The all – purpose computer memory became the assembly place in which all parts of a long computation were kept, worked on piece by piece, and put together to form the final results. The computer control survived only as an “errand runner” for the overall process. As soon as the advantage of these techniques became clear, they became a standard practice. Image Image The first generation of modern programmed electronic computers to take advantage of these improvements were built in 1947. This group included computers using Random – Access – Memory (RAM), which is a memory designed to give almost constant access to any particular piece of information. . These machines had punched – card or punched tape I/O devices and RAM’s of 1,000 – word capacity and access times of .5 Greek MU seconds (.5*10-6 seconds). Some of them could perform multiplications in 2 to 4 MU seconds. Physically, they were much smaller than ENIAC. Some were about the size of a grand piano and used only 2,500 electron tubes, a lot less then required by the earlier ENIAC. The first – generation stored – program computers needed a lot of maintenance, reached probably about 70 to 80% reliability of operation (ROO) and were used for 8 to 12 years. They were usually programmed in ML, although by the mid 1950′s progress had been made in several aspects of advanced programming. This group of computers included EDVAC (above) and UNIVAC (right) the first commercially available computers. source 3. What the difference between general book and reference book?
      - The distinction between a book and a reference book can be confusing. Some books that you might "reference" are still considered "books" for the purposes of citation. Reference books are used to find factual information on a subject, and are not usually read all the way through or chapter by chapter. In a K-12 library, reference books are usually located in a special reference collection area, and cannot be checked out. Reference books include dictionaries, encyclopedias, thesauri, almanacs, atlases, and directories. As a side note, in APA, the reader must also distinguish between reference books and what are called "annual periodicals." For example, consider a yearbook (which looks like a reference work). Annual periodicals often resemble edited books. To tell the difference, look at the publication's subtitle. If the subtitle changes annually, it should be treated as an edited book or reference work. If there is no subtitle, or the subtitle does not change year to year, it should be treated as an annual periodical. source 4.when do you need to search information from the reference collection? -When the colection of  sources in print electronic from intended to be referred to rather than read. The materials are usually not for loan outside the library
     
    -When events and dates facts and figuer and background 
     
     
     
    5.What type of referrence collection that you like to use most and Why?
     
    -Dictionary becuase containing information about the words, spelling and eeasy  usage.
    -Encyclopedia becuase systematic summary of significant of significant knowledge a summary of knowledge of one subject.