• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the component parts of a computer system - Include both hardware, software and the types of printer available.

Extracts from this document...

Introduction

ANNIE MACKENZIE HE ACCESS TO BUSINESS STUDIES & COMPUTING USING BUSINESS INFORMATION TECHNOLOGY ASSIGNMENT NO.1A TASK ONE - Explain the component parts of a computer system. Include both hardware, software and the types of printer available. A computer is a machine that processes information and is made up of different components. A computer system can be divided into hardware and software. Hardware Hardware is the name for all the parts of a computer system that can be touched, for example the mouse or keyboard. Basically these devices can be split into: * Central Processing Unit (CPU) * Input devices * Output devices * Backing store (Memory) The central processing unit The CPU is the brain of the computer. It is responsible for processing the data and turning it into information that we can understand. There are three main elements of the CPU: * The control unit which co-ordinates the input and output devices. * The arithmetic and logic unit, which performs all the calculations and makes all of the logic decisions. * The immediate access store, which provides immediate memory for holding data and programs. Input devices An input device receives data and sends it to the central processing unit. The input device converts the data into binary form that the computer processor can understand and accept. Keyboard - This is probably the most widely used and simplest of input devices. On the typical keyboard the layout of the keys is based on the 'QWERTY' layout the same as on a standard typewriter but with extra keys that are required to enable control signs to be sent to the computer. Mouse - This is a mouse shaped object designed to fit under a hand while it is moved about over a desk. It has a metal or rubber ball protruding from its base that together with the internal mechanism detects movements and converts them to electronic signals. ...read more.

Middle

This I found to be a useful feature that other MP3 packages do not usually have. You can also classify all of your music as each MP3 can be given a tag, which includes the artists name, song title, album and genre. MusicMatch will even connect to the Internet to look up the tags for you. This facility enables you choose a particular genre and let the computer select the music for you. MusicMatch also makes the recording of MP3's very easy and also relatively fast. However, I have discovered that MusicMatch isn't without problems one of which is the annoying fact that it always try's to connect to the Internet and it is slightly confusing to use. It has no real music download (from the Internet) facility therefore the only time I use the Internet with this package is for listening to the radio. Finally, there is also no audio equaliser, which I think would be a nice addition to the package. Review of Windows Media Player Windows media player can be used for playing, recording and organising multimedia on your computer. It can be used to listen/record MP3's, watch films and listen to the radio on the Internet. It can support many different file formats including: Real Audio, Real Video, MPEG 1, MPEG 2, MPEG 3 (MP3). Windows Media Player is extremely easy to use as it has the same format as other Microsoft programs, such as MS Word where you go to the File menu and then to Open. Similar to MusicMatch it is capable of searching your hard drive for media files and adding them to your library but unlike MusicMatch it also has a 10-band audio equaliser which I find gives it a much better sound quality. Windows Media Player usually comes installed on your computer if you have a Microsoft Operating System. If you do not, or you have an older version it can be downloaded for free from the Internet. ...read more.

Conclusion

There are also some exemptions to the Data Protection Act where computer users do not have to register the data being held with the Data Protection Registrar: * Recreational use - This means that data held on a home computer regarding personal, family and household affairs does not need to be registered with the DPR. This would include the individual's own sensitive data such as details of medical health or past convictions. * Preparation of text documents - This exemption means that computer users are allowed to keep data, which will enable them to prepare documents. This would include data held on your home computer that you intended to write in a letter to the individual. * Accounts/Wages/Purchases/Sales - This means that data held on a computer for the purpose of preparing accounts such as sales and purchase ledgers, salary and pensions does not need to be registered. This includes information passed by an individual to their accountant for the preparation of their accounts. * Distribution of articles - This means that computer users are permitted to hold data on their computers without registering it if it enables them to forward correspondence to the individual. This would include a list of friend's names and addresses that you intended to send Christmas cards to. * Sports/Recreational club (not limited company) This exemption enables these types of establishment to hold individuals data without it being registered with the DPA. This will include membership details and possibly your bank details for the payment of the membership. There are also instances where the Data Protection Agency will release an individuals data but only if it is in the interest of preventing crime, prosecuting offenders, assessing tax or relating to health or social work. The DPA also has access to amend incorrect data, delete data that is no longer permitted to be held and access to pass data to the individual subject upon their request. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. The impact of the availability of electric information on individuals and society

    if they would want to because of the policy of the government. The best example why some people can't have an access to the internet because of the policy of the government is North Korea. It's probably the most isolated country in the world because there is no broadband data

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    The BIOS itself includes user defined parameters and hence is not stored in ROM entirely. In fact the BIOS tends to be stored in a special type of RAM which is refreshed using battery power when the system is switched off.

  1. The CPU (Central Processing Unit) is the processor within the computer

    Storage Devices - CD ROM CD ROMs store a large amount of data. Most computer games are now purchased on CD ROMs. Data is stored optically which means that it is read by using a laser. The CD ROM is placed inside a drive and the disc rotates at high speed.

  2. I have been given the task to design a database for a company called ...

    This is so that the system can use the weight in the parcel table to calculate the cost by using the weight cost table. SECURITY AND INTEGRITY OF DATA Integrity Input Masks Input masks can be used in fields in tables to format data and have some sort of control over what values can be entered into them.

  1. Creating a computer system for Wooten Basset Rugby Club

    identify each record, these are marked by these symbols, < and >. PLAYERS deals with data relating to players such as membership and contact details: <Membership Number> - A unique code used to identify each player. Each Membership code is made up of three numbers and a letter.

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    Asiaworld-Expo Report Start Time: 04.12.2005 17:01:28 Finish Time: 04.12.2005 17:10:37 Elapsed: 0 day(s) 00:09:09 Total records generated: 20 high severity: 0 Medium severity: 2 informational: 18 203.86.133.1 Service Severity Description telnet (23/tcp) Info Port is open http (80/tcp) Info Port is open ntp (123/udp) Info Port is open ssh (22/tcp)

  1. You need to discuss the advantages and disadvantages of someone in your

    This information would be useful to see how many of Just Sports' customers live in the local area. The results may be used to drive business decision making on investment in local promotional activities or local advertising versus a wider regional or ad hoc approach.

  2. Flexible Architectures in Communication Security Application

    We then examine performance results in Chapter 6. In the final sections, we discuss related work, summarize our findings, and make suggestions for future work. Lisa Wu Page 13 4/22/01 Chapter 2 The Nature of Cryptography Figure 3 shows the kernel of the Twofish cipher, developed by Counterpane Systems [35].

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work