• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the component parts of a computer system - Include both hardware, software and the types of printer available.

Extracts from this document...

Introduction

ANNIE MACKENZIE HE ACCESS TO BUSINESS STUDIES & COMPUTING USING BUSINESS INFORMATION TECHNOLOGY ASSIGNMENT NO.1A TASK ONE - Explain the component parts of a computer system. Include both hardware, software and the types of printer available. A computer is a machine that processes information and is made up of different components. A computer system can be divided into hardware and software. Hardware Hardware is the name for all the parts of a computer system that can be touched, for example the mouse or keyboard. Basically these devices can be split into: * Central Processing Unit (CPU) * Input devices * Output devices * Backing store (Memory) The central processing unit The CPU is the brain of the computer. It is responsible for processing the data and turning it into information that we can understand. There are three main elements of the CPU: * The control unit which co-ordinates the input and output devices. * The arithmetic and logic unit, which performs all the calculations and makes all of the logic decisions. * The immediate access store, which provides immediate memory for holding data and programs. Input devices An input device receives data and sends it to the central processing unit. The input device converts the data into binary form that the computer processor can understand and accept. Keyboard - This is probably the most widely used and simplest of input devices. On the typical keyboard the layout of the keys is based on the 'QWERTY' layout the same as on a standard typewriter but with extra keys that are required to enable control signs to be sent to the computer. Mouse - This is a mouse shaped object designed to fit under a hand while it is moved about over a desk. It has a metal or rubber ball protruding from its base that together with the internal mechanism detects movements and converts them to electronic signals. ...read more.

Middle

This I found to be a useful feature that other MP3 packages do not usually have. You can also classify all of your music as each MP3 can be given a tag, which includes the artists name, song title, album and genre. MusicMatch will even connect to the Internet to look up the tags for you. This facility enables you choose a particular genre and let the computer select the music for you. MusicMatch also makes the recording of MP3's very easy and also relatively fast. However, I have discovered that MusicMatch isn't without problems one of which is the annoying fact that it always try's to connect to the Internet and it is slightly confusing to use. It has no real music download (from the Internet) facility therefore the only time I use the Internet with this package is for listening to the radio. Finally, there is also no audio equaliser, which I think would be a nice addition to the package. Review of Windows Media Player Windows media player can be used for playing, recording and organising multimedia on your computer. It can be used to listen/record MP3's, watch films and listen to the radio on the Internet. It can support many different file formats including: Real Audio, Real Video, MPEG 1, MPEG 2, MPEG 3 (MP3). Windows Media Player is extremely easy to use as it has the same format as other Microsoft programs, such as MS Word where you go to the File menu and then to Open. Similar to MusicMatch it is capable of searching your hard drive for media files and adding them to your library but unlike MusicMatch it also has a 10-band audio equaliser which I find gives it a much better sound quality. Windows Media Player usually comes installed on your computer if you have a Microsoft Operating System. If you do not, or you have an older version it can be downloaded for free from the Internet. ...read more.

Conclusion

There are also some exemptions to the Data Protection Act where computer users do not have to register the data being held with the Data Protection Registrar: * Recreational use - This means that data held on a home computer regarding personal, family and household affairs does not need to be registered with the DPR. This would include the individual's own sensitive data such as details of medical health or past convictions. * Preparation of text documents - This exemption means that computer users are allowed to keep data, which will enable them to prepare documents. This would include data held on your home computer that you intended to write in a letter to the individual. * Accounts/Wages/Purchases/Sales - This means that data held on a computer for the purpose of preparing accounts such as sales and purchase ledgers, salary and pensions does not need to be registered. This includes information passed by an individual to their accountant for the preparation of their accounts. * Distribution of articles - This means that computer users are permitted to hold data on their computers without registering it if it enables them to forward correspondence to the individual. This would include a list of friend's names and addresses that you intended to send Christmas cards to. * Sports/Recreational club (not limited company) This exemption enables these types of establishment to hold individuals data without it being registered with the DPA. This will include membership details and possibly your bank details for the payment of the membership. There are also instances where the Data Protection Agency will release an individuals data but only if it is in the interest of preventing crime, prosecuting offenders, assessing tax or relating to health or social work. The DPA also has access to amend incorrect data, delete data that is no longer permitted to be held and access to pass data to the individual subject upon their request. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    any doubt - remember a legitimate organisation will not be offended if you wish to carry out verification checks. * Abide by the rule that if it looks to good to be true then chances are, it is. * Be careful with the internet, in particular look for any anomalies

  2. Different ways of data capture

    Under the data protection act every organization that stores data about members of the public/employees has a duty to keep data secure i.e. secure from prying, falling into wrtong hands, accidental loss/damage. Potential threats to an info system * Physical - environment in which processing takes place needs to be

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    be formal and transparent for developing policy and fixing remuneration of individuals, it can be seen how much directors earn in the annual report of a company and now a days many people look at that first when looking at investing in a company.

  2. Introduction to Viruses

    respondents are vulnerable to Internet security threats since they do not adhere to all of the key practices that protect their systems from attack. The market for computer and network security products continues to grow as the popularity of the Internet continues to expand worldwide, it is expected that malicious

  1. Develop a system for use by a fitness centre to store and organise the ...

    Un-normalised data Customer ID Customers Name Customers Address Customers Telephone Number Date of Membership Date Membership Expirers Method of club fees payment record of unpaid subscriptions Customer's special requirements Instructor ID Instructor Name Lesson ID Lesson date Lesson Time Lesson Cost 1st Normal form Ensure there are no repeating groups within the entity.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    The policies and procedures that may influence the technical advice would consist of the companies training policies, budget, type of organisation (charity/ other), company culture, work pressure, user IT expertise and other factors. Training Policies A company with a good training policy would most definitely run more efficiently and be more professional.

  1. What is transaction processing?

    Paperless Society Many experts have regularly predicted over the past thirty or so years the arrival of the 'paperless office', in which documents such as letters, memos will exist only as flickering dots on a computer screen. Government have brought in many strategies in order to advance the 'paperless society'

  2. Describe the hardware and software used to create and edit graphic images and compare ...

    damage the surface of the disk which will lead to loss of data in that sector. The disk is also fixed within a device which means it cannot easily be transferred to another computer. Lastly, they are very expensive and disk hard drives are prone to breaking when moved in operation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work