Free Essay

Tech

In: Computers and Technology

Submitted By adrian215
Words 3087
Pages 13
Most I/O devices interface to the CPU in a fashion quite similar to memory. Indeed, many devices appear to the CPU as though they were memory devices. To output data to the outside world the CPU simply stores data into a "memory" location and the data magically appears on some connectors external to the computer. Similarly, to input data from some external device, the CPU simply transfers data from a "memory" location into the CPU; this "memory" location holds the value found on the pins of some external connector.

An output port is a device that looks like a memory cell to the computer but contains connections to the outside world. An I/O port typically uses a latch rather than a flip-flop to implement the memory cell. When the CPU writes to the address associated with the latch, the latch device captures the data and makes it available on a set of wires external to the CPU and memory system (see Figure 7.1). Note that output ports can be write-only, or read/write. The port in Figure 7.1, for example, is a write-only port. Since the outputs on the latch do not loop back to the CPU's data bus, the CPU cannot read the data the latch contains. Both the address decode and write control lines must be active for the latch to operate; when reading from the latch's address the decode line is active, but the write control line is not.

Figure 7.1 A Typical Output Port

Figure 7.2 shows how to create a read/write input/output port. The data written to the output port loops back to a transparent latch. Whenever the CPU reads the decoded address the read and decode lines are active and this activates the lower latch. This places the data previously written to the output port on the CPU's data bus, allowing the CPU to read that data. A read-only (input) port is simply the lower half of Figure 7.2; the system ignores any data written to an input port.

Figure 7.2 An Output Port that Supports Read/Write Access

Note that the port in Figure 7.2 is not an input port. Although the CPU can read this data, this port organization simply lets the CPU read the data it previously wrote to the port. The data appearing on an external connector is an output port (only). One could create a (read-only) input port by using the lower half of the circuit in Figure 7.2. The input to the latch would appear on the CPU's data bus whenever the CPU reads the latch data.

A perfect example of an output port is a parallel printer port. The CPU typically writes an ASCII character to a byte-wide output port that connects to the DB-25F connector on the back of the computer's case. A cable transmits this data to the printer where an input port (to the printer) receives the data. A processor inside the printer typically converts this ASCII character to a sequence of dots it prints on the paper.

Generally, a given peripheral device will use more than a single I/O port. A typical PC parallel printer interface, for example, uses three ports: a read/write port, an input port, and an output port. The read/write port is the data port (it is read/write to allow the CPU to read the last ASCII character it wrote to the printer port). The input port returns control signals from the printer; these signals indicate whether the printer is ready to accept another character, is off-line, is out of paper, etc. The output port transmits control information to the printer such as whether data is available to print.

The first thing to learn about the input/output subsystem is that I/O in a typical computer system is radically different than I/O in a typical high level programming language. In a real computer system you will rarely find machine instructions that behave like writeln, cout, printf, or even the HLA stdin and stdout statements. In fact, most input/output instructions behave exactly like the 80x86's MOV instruction. To send data to an output device, the CPU simply moves that data to a special memory location. To read data from an input device, the CPU simply moves data from the address of that device into the CPU. Other than there are usually more wait states associated with a typical peripheral device than actual memory, the input or output operation looks very similar to a memory read or write operation.

7.3 Read-Only, Write-Only, Read/Write, and Dual I/O Ports

We can classify input/output ports into four categories based on the CPU's ability to read and write data at a given port address. These four categories are read-only ports, write-only ports, read/write ports, and dual I/O ports.

A read-only port is (obviously) an input port. If the CPU can only read the data from the port, then that port is providing data appearing on lines external to the CPU. The system typically ignores any attempt to write data to a read-only port1. A good example of a read-only port is the status port on a PC's parallel printer interface. Reading data from this port lets you test the current condition of the printer. The system ignores any data written to this port.

A write-only port is always an output port. Writing data to such a port presents the data for use by an external device. Attempting to read data from a write-only port generally returns garbage (i.e., whatever values that just happen to be on the data bus at that time). You generally cannot depend on the meaning of any value read from a write-only port.

A read/write port is an output port as far as the outside world is concerned. However, the CPU can read as well as write data to such a port. Whenever the CPU reads data from a read/write port, it reads the data that was last written to the port. Reading the port does not affect the data the external peripheral device sees, reading the port is a simple convenience for the programmer so that s/he doesn't have to save the value last written to the port should they want to retrieve the value.

A dual I/O port is also a read/write port, but reading the port reads data from some external device while writing data to the port transmits data to a different external device. Figure 7.3 shows how you could interface such a device to the system. Note that the input and output ports are actually a read-only and a write-only port that share the same address. Reading the address accesses one port while writing to the address accesses the other port. Essentially, this port arrangement uses the R/W control line(s) as an extra address bit when selecting these ports.

Figure 7.3 An Input and an Output Device That Share the Same Address (a Dual I/O Port)

These examples may leave you with the impression that the CPU always reads and writes data to peripheral devices using data on the data bus (that is, whatever data the CPU places on the data bus when it writes to an output port is the data actually written to that output port). While this is generally true for input ports (that is, the CPU transfers input data across the data bus when reading data from the input port), this isn't necessarily true for output ports. In fact, a very common output mechanism is simply accessing a port. Figure 7.4 provides a very simple example. In this circuit, an address decoder decodes two separate addresses. Any access (read or write) to the first address sets the output line high; any read or write of the second address clears the output line. Note that this circuit ignores the data on the CPU's data lines. It is not important whether the CPU reads or writes data to these addresses, nor is the data written of any consequence. The only thing that matters is that the CPU access one of these two addresses.

Figure 7.4 Outputting Data to a Port by Simply Accessing That Port

Another possible way to connect an output port to the CPU is to use a D flip-flop and connect the read/write status lines to the D input on the flip-flop. Figure 7.5 shows how you could design such a device. In this diagram any read of the selected port sets the output bit to zero while a write to this output port sets the output bit to one.

Figure 7.5 Outputting Data Using the Read/Write Control as the Data to Output

There are a wide variety of ways you can connect external devices to the CPU. This section only provides a few examples as a sampling of what is possible. In the real world, there are an amazing number of different ways that engineers connect external devices to the CPU. Unless otherwise noted, the rest of this chapter will assume that the CPU reads and writes data to an external device using the data bus. This is not to imply that this is the only type of I/O that one could use in a given example.

7.4 I/O (Input/Output) Mechanisms

There are three basic forms of input and output that a typical computer system will use: I/O-mapped I/O, memory-mapped I/O, and direct memory access (DMA). I/O-mapped input/output uses special instructions to transfer data between the computer system and the outside world; memory-mapped I/O uses special memory locations in the normal address space of the CPU to communicate with real-world devices; DMA is a special form of memory-mapped I/O where the peripheral device reads and writes data in memory without going through the CPU. Each I/O mechanism has its own set of advantages and disadvantages, we will discuss these in this section.

7.4.1 Memory Mapped Input/Output

A memory mapped peripheral device is connected to the CPU's address and data lines exactly like memory, so whenever the CPU reads or writes the address associated with the peripheral device, the CPU transfers data to or from the device. This mechanism has several benefits and only a few disadvantages.

The principle advantage of a memory-mapped I/O subsystem is that the CPU can use any instruction that accesses memory to transfer data between the CPU and a memory-mapped I/O device. The MOV instruction is the one most commonly used to send and receive data from a memory-mapped I/O device, but any instruction that reads or writes data in memory is also legal. For example, if you have an I/O port that is read/write, you can use the ADD instruction to read the port, add data to the value read, and then write data back to the port.

Of course, this feature is only usable if the port is a read/write port (or the port is readable and you've specified the port address as the source operand of your ADD instruction). If the port is read-only or write-only, an instruction that reads memory, modifies the value, and then writes the modified value back to memory will be of little use. You should use such read/modify/write instructions only with read/write ports (or dual I/O ports if such an operation makes sense).

Nevertheless, the fact that you can use any instruction that accesses memory to manipulate port data is often a big advantage since you can operate on the data with a single instruction rather than first moving the data into the CPU, manipulating the data, and then writing the data back to the I/O port.

The big disadvantage of memory-mapped I/O devices is that they consume addresses in the memory map. Generally, the minimum amount of space you can allocate to a peripheral (or block of related peripherals) is a four kilobyte page. Therefore, a few independent peripherals can wind up consuming a fair amount of the physical address space. Fortunately, a typical PC has only a couple dozen such devices, so this isn't much of a problem. However, some devices, like video cards, consume a large chunk of the address space (e.g., some video cards have 32 megabytes of on-board memory that they map into the memory address space).

7.4.2 I/O Mapped Input/Output

I/O-mapped input/output uses special instructions to access I/O ports. Many CPUs do not provide this type of I/O, though the 80x86 does. The Intel 80x86 family uses the IN and OUT instructions to provide I/O-mapped input/output capabilities. The 80x86 IN and OUT instructions behave somewhat like the MOV instruction except they transmit their data to and from a special I/O address space that is distinct from the memory address space. The IN and OUT instructions use the following syntax:

in( port, al ); // ... or AX or EAX, port is a constant in the range

out( al, port ); // 0..255.

in( dx, al ); // Or AX or EAX.

out( al, dx );

The 80x86 family uses a separate address bus for I/O transfers2. This bus is only 16-bits wide, so the 80x86 can access a maximum of 65,536 different bytes in the I/O space. The first two instructions encode the port address as an eight-bit constant, so they're actually limited to accessing only the first 256 I/O addresses in this address space. This makes the instruction shorter (two bytes instead of three). Unfortunately, most of the interesting peripheral devices are at addresses above 255, so the first pair of instructions above are only useful for accessing certain on-board peripherals in a PC system.

To access I/O ports at addresses beyond 255 you must use the latter two forms of the IN and OUT instructions above. These forms require that you load the 16-bit I/O address into the DX register and use DX as a pointer to the specified I/O address. For example, to write a byte to the I/O address $3783 you would use an instruction sequence like the following:

mov( $378, dx );

out( al, dx );

The advantage of an I/O address space is that peripheral devices mapped to this area do not consume space in the memory address space. This allows you to fully expand the memory address space with RAM or other memory. On the other hand, you cannot use arbitrary memory instructions to access peripherals in the I/O address space, you can only use the IN and OUT instructions.

Another disadvantage to the 80x86's I/O address space is that it is quite small. Although most peripheral devices only use a couple of I/O address (and most use fewer than 16 I/O addresses), a few devices, like video display cards, can occupy millions of different I/O locations (e.g., three bytes for each pixel on the screen). As noted earlier, some video display cards have 32 megabytes of dual-ported RAM on board. Clearly we cannot easily map this many locations into the 64K I/O address space.

7.4.3 Direct Memory Access

Memory-mapped I/O subsystems and I/O-mapped subsystems both require the CPU to move data between the peripheral device and main memory. For this reason, we often call these two forms of input/output programmed I/O. For example, to input a sequence of ten bytes from an input port and store these bytes into memory the CPU must read each value and store it into memory. For very high-speed I/O devices the CPU may be too slow when processing this data a byte (or word or double word) at a time. Such devices generally have an interface to the CPU's bus so they can directly read and write memory. This is known as direct memory access since the peripheral device accesses memory directly, without using the CPU as an intermediary. This often allows the I/O operation to proceed in parallel with other CPU operations, thereby increasing the overall speed of the system. Note, however, that the CPU and DMA device cannot both use the address and data busses at the same time. Therefore, concurrent processing only occurs if the CPU has a cache and is executing code and accessing data found in the cache (so the bus is free). Nevertheless, even if the CPU must halt and wait for the DMA operation to complete, the I/O is still much faster since many of the bus operations during I/O or memory-mapped input/output consist of instruction fetches or I/O port accesses which are not present during DMA operations.

A typical DMA controller consists of a pair of counters and other circuitry that interfaces with memory and the peripheral device. One of the counters serves as an address register. This counter supplies an address on the address bus for each transfer. The second counter specifies the number of transfers to complete. Each time the peripheral device wants to transfer data to or from memory, it sends a signal to the DMA controller. The DMA controller places the value of the address counter on the address bus. At the same time, the peripheral device places data on the data bus (if this is an input operation) or reads data from the data bus (if this is an output operation). After a successful data transfer, the DMA controller increments its address register and decrements the transfer counter. This process repeats until the transfer counter decrements to zero.

1Note, however, that some devices may fail if you attempt to write to their corresponding input ports, so it's never a good idea to write data to a read-only port.

2Physically, the I/O address bus is the same as the memory address bus, but additional control lines determine whether the address on the bus is accessing memory or and I/O device.

3This is typically the address of the data port on the parallel printer port.…...

Similar Documents

Premium Essay

Cedar Tech

...Group Teams 30 Chapter 11: Managing Change 32 References 35 Synopsis Mount Cedar Technologies, Inc., also referred to as Cedar Tech, was founded in Los Angeles, CA in 1995 by John Curtis and Frank Mathew. More than 80% of Cedar Tech’s business comes from customers within California while less than 20% comes from other states. The company started off as an importer and distributor of computer accessories such as computer cables, audio/video cables, surge protectors, etc. In 1998, the company added new products by becoming a provider of third party technology, including hardware, software and services to corporate customers including computer and networking accessories, computers, peripherals, printers, displays, printer consumables, and software. They also offered services such as installing hardware and peripherals into systems, provided standard and custom hardware configuration for personal computers (PCs), notebooks, printers and servers. By 2000, the company evolved into an IT infrastructure integrator specializing in hardware and software products, storage and security solutions, and technical services to enterprise, small and medium businesses, government, educational and medical institutions. Also in 2000, Cedar Tech acquired Denta Solutions of Los Angeles, a small solutions provider that specialized in IT storage. Cedar Tech began with only 6 employees in 1995 and grew to more than 170 employees by 2006. While the company grew, it lacked in......

Words: 7241 - Pages: 29

Premium Essay

Hemo Tech

...Hemo Tech Case Study Liliana Buzoianu Ayers Keiser University ACG5075 Dr. Bedell May 26, 2013 Intro Bringing a new technology on the medical equipment market, Hemo Tech becomes known on the market by being the only company that is selling a new technology. The new technology is known as BIO-07, new medical equipment that’s innovating the previous model BIO-02 by improving considerably the blood collection process. Hemo Tech signed an exclusivity contract with Extract Co. through which Hemo is offering a large variety of services including, but not limited to supplies, screening and monitoring test services, having the main target of reducing contamination level. Based on the International Financial Reporting Standards, also known as IFRS, Hemo Tech is interested to find out what accounting standards the company needs to use in order to offer more accurate information regarding the deliverables. In the same time FASB (The Financial Accounting Standard Board) was adopted by Hemo Tech, n order to determine which of the products deliverables are or not. One thing to be mentioned is the fact that this new technology that Hemo Tech is using is approved in advance by FDA (Food and Drug Administration). VSOE (Vendor Specific Objective Evidence), TPE (third-party evidence) and ESP (the estimate selling price) become the main point of interest for Hemo Tech, which needs to figure out which of the techniques is the best at serving its needs. Analysis As O’Connor noticed,...

Words: 688 - Pages: 3

Premium Essay

Hemo Tech

...deliverables in the arrangement (Deloitte Development, 2010). Hemo Tech seems to have covered all their bases, assuming that the consumer decides to proceed into a contractual agreement for their equipment and services. Hemo Tech did not include training/ in-service as a deliverable. It is considered a deliverable because it is a service. Most medical equipment vendors readily offer this service as an incentive to purchasing their equipment. It is very necessary because this is the best way to fully ensure the user knows how to use it. The instruction manual is a great guide, but hands-on training is preferred when dealing with medical vendors. Part II Hemo Tech only sells it systems and installations as bundle, it does not sell it items individually. Hemo Tech does not have VSOE for selling prices of its equipment. Hemo Tech does not have TPE for selling prices, neither, due to the more advanced technology of their equipment compared to their competitors. Hemo Tech uses best estimations to determine selling prices by considering the cost taken to manufacture and develop the deliverables. In regards to the discounts on future services, Hemo Tech has VSOE for selling prices, because the supplies are sold separately at a consistent price. They, also, have TPE for selling price for their supplies because the items other vendors have supplies that are interchangeable to their supplies. Only issue is Hemo Tech supplies offers more enhanced feature that......

Words: 501 - Pages: 3

Premium Essay

Tech Vata

...Tech Data Corporation Restating jumal Statements Submitted To: Prof………….. Strategy Management Stayer University Date: May 1, 2013 Tech Data Corporation (TECD) headquartered in Clearwater, FL, is one of the world’s largest wholesale distributors of technology products. Its supreme logistics capabilities and value added services enable 120,000 resellers in more than 100 countries to efficiently and cost effectively support the diverse technology needs of end users. The company is ranked 109th on the Fortune 500. Tech Data Corporation was founded by Edward C. Raymund in 1974 and its initial charter was to market data processing supplies directly to end users of mini and mainframe computers. Later in 1983 Tech Data Corporation enlarge its goal and started servicing microcomputers resellers as a wholesale distributor. Today the company sold about $24 billion of IT products to more than 125,000 technology resellers in over 100 countries. On March 21, 2013 Tech Data Corporation announced that company will restate some or all of its previously issued quarterly and audited annual financial statements for the fiscal year 2011, 20012 and 2013 including its recently released earnings from March 4, 2013.. Tech Data Corporation announced to restate in the recommendation of management, audit committee of its Board of Directors and after discussion with the Company’s independent accountants, Ernst & Young LLP. Tech Data Corporation will look for a 15 day filing extension......

Words: 919 - Pages: 4

Premium Essay

Hemo Tech

...Hemo-Tech Inc. A Case Study Analyis Shelli McCarten Keiser University ACG 5075 Dr. Randy Kuhn September 23, 2013 Hemo-Tech Inc. (“Hemo”) has entered into an agreement with Extract Co. (“Extract”) to provide certain equipment and services. Within the agreement, Hemo has identified five units of equipment, 50 boxes of equipment supplies, installation, one-year monitor and test services, and three-year screen and report services as deliverables. Hemo has identified these deliverables based on its adoption of Accounting Standards Code 605-25 and updated by FASB ASU 2009-13. Advice provided from Ernst & Young’s guide on ‘Revenue recognition-Multiple element arrangements’, which is based on ASC 605-25, states that a deliverable generally includes all performance obligations imposed on a vendor by an agreement and a deliverable may be an obligation to provide goods, an obligation to deliver services, a right or license to use an asset, or some other vendor performance obligation that was bargained for as part of the arrangement (“Revenue recognition – Multiple element arrangements”, 2012). The advice also states that an item is presumed to be deliverable if: 1) It is explicitly referred to as an obligation of the vendor in a contractual agreement; 2) It requires a distinct action by the vendor; 3) The vendor’s failure to complete an action would result in significant contractual penalty; 4) The inclusion or exclusion of the item in the arrangement......

Words: 631 - Pages: 3

Free Essay

Tech Manager

...Technology Manager Research Assignment Due August 30, 2012 1. Using an employment site (e.g., monster.com), what types of jobs do you find when you research the term “technology manager”? * On careerbuilder.com I found several jobs that popped up. Most jobs had to do with information systems, but there are also ones that have to do with project management. 2. Are these the types of jobs you expected to find and why? * These are close to the jobs I was expecting. I know a lot of people think that Tech management has to with information systems and project management. That we deal with technology systems. IT work seems to be the general idea of what people think tech management has to do with. However it seems that there are the few of them that are in different fields that deal with just management. 3. How would you define” technology manager” based on what you found? * I would consider technology manager has to do with a combination of technology work and project management. But I believe Technology Manager has a lot more to o with being able to help a business out with all the technologies it uses and how to incorporate it better into the work a business does. 4. How is this definition similar to the article “What is a Technology Manager”? * It is close to the definition from the article. The article is stating that most graduates go into project management positions and most students have management emphasis in their......

Words: 305 - Pages: 2

Premium Essay

Tech

...still suffers in comparison to arch- rival GE, whose shares have had a total return of 423% over the past 10 years, versus 273% for the German company. Von Pierer himself has admitted that he wasn’t always able to push change as fast as he would have liked. It’s not just a question of cutting costs. “In the innovation game, productivity and R&D matter more than cost structure,” says William M. Castell, CEO of GE Healthcare. Siemens boasts that its engineers and scientists generate more than 8,000 inventions a year, but it needs to do more to turn those innovations into commercial products. Siemens was a leader in introducing mobile-phone handsets with color screens and built-in MP3 music players, for example, but wasn’t able to translate its tech edge into market strength. Can Kleinfeld succeed? He doubtless has the drive. Kleinfeld’s father, a shipyard laborer who became an engineer by studying nights, died when the boy was 10. That was a “brutal” experience, Kleinfeld says, but the hardship that followed forged a determination to succeed. An only child, he stocked grocery shelves at age 12 and has held a job ever since. After studying business at Georg August University in Göttingen, Kleinfeld put in stints at a Nuremberg market research firm and at drugmaker Ciba-Geigy before joining Siemens’s corporate sales and marketing department in 1987. The new Siemens chief was a multitasker before anyone used the term. Many of his generation milk Germany’s free university system for......

Words: 1771 - Pages: 8

Premium Essay

Tech

...the term and learn to work together effectively on group assignments. fD ts o r. T a hom y sB Preface xvii WHAT’S NEW Based upon feedback from readers and new developments in the field of technology entrepreneurship, numerous enhancements appear in this third edition. Recent compelling academic theories and practitioner insights in entrepreneurship are included in the text. Special attention is given to technology transfer and commercialization processes, open source innovation, and social entrepreneurship. All examples and exercises were reviewed to place even more emphasis on exciting technology ventures around the globe involved in energy and environmental technology applications, often referred to as clean or green tech. Chapters 1 and 2 are now better organized to introduce the the art and science of venturing. Chapter 4 on strategy development now contains important sections regarding alliances and social responsibility. The discussion in Chapter 5 on creativity and sources of innovation has a smoother flow. The d. ibite concept story and business plan development materials and tools are expanded h pro and summarized in Chapter 7. Chapter 13 now contains a section on clusters e is s and regions of entrepreneurship. New sections on cost drivers and grants as a ther u source of capital were added to Chapters 16 and 18, respectively. Three new o Any s. full-length cases are included in the appendix including two from ther famous Bye Harvard Business......

Words: 60653 - Pages: 243

Free Essay

Tech

...revolved around warfare, city-building, entertainment and “showing off” power and wealth - status of engineers in these courts increases with new political and military projects - Court patronage necessary for “Renaissance men” like Leonardo da Vinci and Galileo Galilei; courts provided vast resources, access to figures in power - New technique in the world of art, introduced by Leon Alberti, called linear perspective - Brought depth and perspective to drawings - Prior to this period, buildings were not drawn according to depth - People were drawn according to their status - Depth signals a huge change to peoples attitudes toward technology - Drawings of technology started using linear perspective, tech drawings blossomed - More interesting to look at - For the first time, peoples imaginations are opened up with the advanced images of invention - Technology and science are moving closely together…slowly - 3 reasons why we recognize this change: - -> Increased use of instruments and tools in scientific practices (experiments): more technology being used in scientific practices i.e. telescope, microscope - -> Social Spaces: places where people of different disciplines come together, talk and share knowledge i.e. pubs, coffee houses which first started during this area, salon - -> Hybrid Human: someone with interest in both science and technology A. Leonardo da Vinci (1452-1519) - little is......

Words: 3090 - Pages: 13

Premium Essay

Smartphone Tech

... AP Economics/ Period 4 Mr. Dolgin November 14, 2013 As a country now surrounded by many devices and companies associated with technology, probably the first piece of that technology that has launched America to where it is now is the Smartphone. But what has it done for us since it first came out? With the recent increase in technological innovation among phones, consumers have been buying and upgrading their cell phones whenever they please. This has led to the Smartphone-producing companies’ stocks to increase. It has also led to a big rise in jobs in the job economy. The Smartphone has also made itself very valuable and wanted by consumers. Since Smartphone technology is prominent in the daily lives of everyone, I see the tech-device having a positive effect on the United States Economy by increasing growth and welfare on the companies and consumers. Since the time the Smartphone was introduced, many stock values for technology-savvy companies have risen. According to The Denver Post, Apple’s success from the iPhone since its launch in 2007 has made the company get the title of “the most valuable company in American History” due to Apple’s stocks and what the company is worth. With the iPhone constantly upgrading and consumers buying the product, the value of Apple continues to accelerate. The stock market as a whole has definitely risen since 2007. According to Bryan Borzykowski from BBC, since 2009, the S&P Global 1200 Telecommunication Services has......

Words: 1189 - Pages: 5

Premium Essay

Itt Tech

...objective for this job is to obtain some people skills from interacting with the customers that come in and learn more about the phone industry, I’m currently a student at ITT Tech majoring in Network Systems Administration and thought this job would be a good start in the tech industry. | Skills & Abilities | | I have been working with Computers since the age of 13 so my computer tech skills are well refined, I can and will adjust to any environment when need be, I am a quick learner regardless of what it may be I can and will learn it as fast as I possibly can, I am extremely patient and have been known to work well with people. | Experience | | Dish washer, Minnesota misonic Homes North ridge March 2013 To May 2013 My duties as the dish washer goes beyond the title I not only made sure all the dishes were clean I also helped with serving the food, my job was a bit stressful at times because we was working with the elderly who’s immune system is much weaker because of aging. Pizza Maker, Pizza Ranch August 2014, Current employer My task are to make and prep the dough in the morning and also make quick but quality pizza’s as fast as possible keeping up with the orders and the Buffet line. | Education | | ITT TECHNICAL INSTATUTE – Brooklyn Center - BA I am currently a student at ITT Tech working on my BA in Network System Administration, I just finish with my first quarter in the summer and now moving on to the second quarter in the fall, I currently......

Words: 415 - Pages: 2

Free Essay

Detail Tech

...Detail-Tech Objective To prepare the vehicle for delivery as quickly as possible in a safe and quality manner, with a fit and finish that meets or exceeds the original factory fit and finish. The end result should be an invisible repair. Overview A great deal of emphasis should be placed on the overall quality of the detailing job since it is the final signature of approval on the repairs conducted. For this reason, the detail technician must be meticulous and thorough in performing the final get ready on the vehicle. The detailing process is a reflection of the rest of the work you do. The thoroughness and quality of the final detailing can have a significant impact on the customer’s perception of quality, and may even be the deciding factor in pleasing the customer. The detail technician must consistently perform his/her duties to the company standard of quality. Detail Technician Responsibilities 1. You must provide your own set of basic hand tools including, but not limited to, wrenches, pliers, screw drivers, sockets, ratchets, etc. Tools should be stored in a mobile tool cabinet. 2. Inspect every vehicle as it enters the detail shop to ensure that it has passed all previous inspections and standards. Read the entire Work Order thoroughly and visually inspect the vehicle to check that all the repairs listed are complete. Give extra attention to any special promises or notes, and if any discrepancies are found notify the appropriate person......

Words: 391 - Pages: 2

Premium Essay

Tech

...John Weatherwax Week 7 En 1320 Research paper New technology break troughs, Research question, less than 30 years ago we had no cell phones If we can talk on a cell phone that is a watch today and where will we be in 30 more years? Just by what I have seen and heard from various producers of cell phones I do believe that the cell phone tech is going to be in the field of a wearable devices the new (in the last few years ) watches are just the start. In the 50’s Dick Tracy had a watch that the new watches mimic so what is next will it implants or projectable it is hard to tell but in my thoughts it will be in the realm of a wearable and possibly a wearable projection device. Articale #1 Cast your mind back to late 2008, when the first Android-powered handset saw the light of day. Obama won his first Presidential election, Apple launched its App Store (the iPhone had appeared the year before), Google announced its own Chrome browser and we got our first look at the company's new mobile OS on the T-Mobile G1. The Android of 2013 is a world away from that 2008 version, where the Android Market was in its infancy, there were no native video playback capabilities and the G1 had no multi-touch support. But Google is going to have to keep innovating and improving its mobile OS to keep the lion's share of the smartphone market. We've taken a peek into the future to consider what Android might look like in the year 2020. With new Android monikers now appearing about......

Words: 3468 - Pages: 14

Free Essay

Ssay on Tech

... Some teachers appose the fact of using technology in the classroom such as tablets and notebooks computers. Some teachers might say it is a waste of money. However, lets face it this is the 21st century more and more k-12 grade teachers are using technology daily in the classroom. So teachers can get ready to drop textbooks and get ready to use technology in the classroom. There are many teachers and educators that believe children will succeed in the future if they use tablets and notebook computers instead of hard copy textbooks. Therefore, if the children of America begin use technology more, they will be better equipped to handle technology in the future and possibly get a tech related job. Not only would the students have fun but also they will work better with tech. By using technology, teachers will start to reshape the schools of the United States....

Words: 603 - Pages: 3

Free Essay

Tech

...new TLF Panel survey conducted on behalf of kids clothing retailer Vertbaudet.co.uk found that four in five parents believe technology and gadgets are good for kids, aiding in their development. The study found that 37 percent of parents asked said that their child spent between one and two hours a day playing with tech gadgets, and 28 percent said between two- and three hours. Moreover, the study found that 38 percent of two- to five-year-olds own an Android tablet, and 32 percent own an iPad; almost a third (32 percent) of these kids also have a mobile phone. The reason behind all this gadget use: over a third of parents (35 percent) said they use tech gadgets to entertain their children because they are convenient, and nearly a quarter (23 percent) because they want their children to be tech-savvy. A 2015 survey of 1,000 British mothers of children aged 2 to 12 found that 85 percent of mums admit to using technology to keep the kids occupied while they get on with other activities. The AO.com survey pointed to children spending on average around 17 hours a week in front of a screen – almost double the 8.8 weekly hours spent playing outside. Wanting our children to tech-savvy is understandable, and the need to keep them entertained will also make sense to many a parent. But we must also weigh up the risks associated with children having too much screen time. In his lecture ‘Managing Screen Time and Screen Dependency’ Dr Aric Sigman argues that “whether it’s Facebook, the......

Words: 3718 - Pages: 15