• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the component parts of a computer system - Include both hardware, software and the types of printer available.

Extracts from this document...

Introduction

ANNIE MACKENZIE HE ACCESS TO BUSINESS STUDIES & COMPUTING USING BUSINESS INFORMATION TECHNOLOGY ASSIGNMENT NO.1A TASK ONE - Explain the component parts of a computer system. Include both hardware, software and the types of printer available. A computer is a machine that processes information and is made up of different components. A computer system can be divided into hardware and software. Hardware Hardware is the name for all the parts of a computer system that can be touched, for example the mouse or keyboard. Basically these devices can be split into: * Central Processing Unit (CPU) * Input devices * Output devices * Backing store (Memory) The central processing unit The CPU is the brain of the computer. It is responsible for processing the data and turning it into information that we can understand. There are three main elements of the CPU: * The control unit which co-ordinates the input and output devices. * The arithmetic and logic unit, which performs all the calculations and makes all of the logic decisions. * The immediate access store, which provides immediate memory for holding data and programs. Input devices An input device receives data and sends it to the central processing unit. The input device converts the data into binary form that the computer processor can understand and accept. Keyboard - This is probably the most widely used and simplest of input devices. On the typical keyboard the layout of the keys is based on the 'QWERTY' layout the same as on a standard typewriter but with extra keys that are required to enable control signs to be sent to the computer. Mouse - This is a mouse shaped object designed to fit under a hand while it is moved about over a desk. It has a metal or rubber ball protruding from its base that together with the internal mechanism detects movements and converts them to electronic signals. ...read more.

Middle

This I found to be a useful feature that other MP3 packages do not usually have. You can also classify all of your music as each MP3 can be given a tag, which includes the artists name, song title, album and genre. MusicMatch will even connect to the Internet to look up the tags for you. This facility enables you choose a particular genre and let the computer select the music for you. MusicMatch also makes the recording of MP3's very easy and also relatively fast. However, I have discovered that MusicMatch isn't without problems one of which is the annoying fact that it always try's to connect to the Internet and it is slightly confusing to use. It has no real music download (from the Internet) facility therefore the only time I use the Internet with this package is for listening to the radio. Finally, there is also no audio equaliser, which I think would be a nice addition to the package. Review of Windows Media Player Windows media player can be used for playing, recording and organising multimedia on your computer. It can be used to listen/record MP3's, watch films and listen to the radio on the Internet. It can support many different file formats including: Real Audio, Real Video, MPEG 1, MPEG 2, MPEG 3 (MP3). Windows Media Player is extremely easy to use as it has the same format as other Microsoft programs, such as MS Word where you go to the File menu and then to Open. Similar to MusicMatch it is capable of searching your hard drive for media files and adding them to your library but unlike MusicMatch it also has a 10-band audio equaliser which I find gives it a much better sound quality. Windows Media Player usually comes installed on your computer if you have a Microsoft Operating System. If you do not, or you have an older version it can be downloaded for free from the Internet. ...read more.

Conclusion

There are also some exemptions to the Data Protection Act where computer users do not have to register the data being held with the Data Protection Registrar: * Recreational use - This means that data held on a home computer regarding personal, family and household affairs does not need to be registered with the DPR. This would include the individual's own sensitive data such as details of medical health or past convictions. * Preparation of text documents - This exemption means that computer users are allowed to keep data, which will enable them to prepare documents. This would include data held on your home computer that you intended to write in a letter to the individual. * Accounts/Wages/Purchases/Sales - This means that data held on a computer for the purpose of preparing accounts such as sales and purchase ledgers, salary and pensions does not need to be registered. This includes information passed by an individual to their accountant for the preparation of their accounts. * Distribution of articles - This means that computer users are permitted to hold data on their computers without registering it if it enables them to forward correspondence to the individual. This would include a list of friend's names and addresses that you intended to send Christmas cards to. * Sports/Recreational club (not limited company) This exemption enables these types of establishment to hold individuals data without it being registered with the DPA. This will include membership details and possibly your bank details for the payment of the membership. There are also instances where the Data Protection Agency will release an individuals data but only if it is in the interest of preventing crime, prosecuting offenders, assessing tax or relating to health or social work. The DPA also has access to amend incorrect data, delete data that is no longer permitted to be held and access to pass data to the individual subject upon their request. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    * Install anti-spyware, anti-virus and firewalls on your PC and or corporate network. * Always delete any email that requests your private information that you cannot otherwise verify the source of. * Never give your private and personal information in an email or on the telephone if you are in

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    WAN This type of network covers a wider area. It is used over high speed, long distance communications such as computers in two different areas. A WAN can also be shared. For example two occupants in two buildings can share the wireless connection to a third person, or a business or anyone or anything they wish to do so.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    The BIOS itself includes user defined parameters and hence is not stored in ROM entirely. In fact the BIOS tends to be stored in a special type of RAM which is refreshed using battery power when the system is switched off.

  2. The impact of the availability of electric information on individuals and society

    if they would want to because of the policy of the government. The best example why some people can't have an access to the internet because of the policy of the government is North Korea. It's probably the most isolated country in the world because there is no broadband data

  1. I have been given the task to design a database for a company called ...

    I will be using input masks to make sure the users don't make obvious errors when inputting data. By obvious I mean, for example, not putting capitals at the beginning of a name or putting too many digits in a phone number.

  2. Creating a computer system for Wooten Basset Rugby Club

    * System will be run from head coach's lap top computer and therefore not need any network capabilities. * Head coach has copies of Microsoft Access already stored on his computer.

  1. Flexible Architectures in Communication Security Application

    The code shown in Figure 3 is the encryption kernel, run on one 128- bit block of data to encrypt it into a 128-bit ciphertext block using a 128-bit key value. The Twofish decryption kernel is nearly identical except the order of the operations is reversed and inverted (e.g., rotate left becomes rotate right).

  2. System I designed in order to produce a promotion package for her newly formed ...

    comments 21/11/00 - Compare design I have produced with original design specification. 22/11/00 - Double check through entire coursework to make sure nothing is missing 24/11/00 - Final Submission date. Hand in coursework Design I used Microsoft Access to create my database design structures.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work