• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the component parts of a computer system - Include both hardware, software and the types of printer available.

Extracts from this document...

Introduction

ANNIE MACKENZIE HE ACCESS TO BUSINESS STUDIES & COMPUTING USING BUSINESS INFORMATION TECHNOLOGY ASSIGNMENT NO.1A TASK ONE - Explain the component parts of a computer system. Include both hardware, software and the types of printer available. A computer is a machine that processes information and is made up of different components. A computer system can be divided into hardware and software. Hardware Hardware is the name for all the parts of a computer system that can be touched, for example the mouse or keyboard. Basically these devices can be split into: * Central Processing Unit (CPU) * Input devices * Output devices * Backing store (Memory) The central processing unit The CPU is the brain of the computer. It is responsible for processing the data and turning it into information that we can understand. There are three main elements of the CPU: * The control unit which co-ordinates the input and output devices. * The arithmetic and logic unit, which performs all the calculations and makes all of the logic decisions. * The immediate access store, which provides immediate memory for holding data and programs. Input devices An input device receives data and sends it to the central processing unit. The input device converts the data into binary form that the computer processor can understand and accept. Keyboard - This is probably the most widely used and simplest of input devices. On the typical keyboard the layout of the keys is based on the 'QWERTY' layout the same as on a standard typewriter but with extra keys that are required to enable control signs to be sent to the computer. Mouse - This is a mouse shaped object designed to fit under a hand while it is moved about over a desk. It has a metal or rubber ball protruding from its base that together with the internal mechanism detects movements and converts them to electronic signals. ...read more.

Middle

This I found to be a useful feature that other MP3 packages do not usually have. You can also classify all of your music as each MP3 can be given a tag, which includes the artists name, song title, album and genre. MusicMatch will even connect to the Internet to look up the tags for you. This facility enables you choose a particular genre and let the computer select the music for you. MusicMatch also makes the recording of MP3's very easy and also relatively fast. However, I have discovered that MusicMatch isn't without problems one of which is the annoying fact that it always try's to connect to the Internet and it is slightly confusing to use. It has no real music download (from the Internet) facility therefore the only time I use the Internet with this package is for listening to the radio. Finally, there is also no audio equaliser, which I think would be a nice addition to the package. Review of Windows Media Player Windows media player can be used for playing, recording and organising multimedia on your computer. It can be used to listen/record MP3's, watch films and listen to the radio on the Internet. It can support many different file formats including: Real Audio, Real Video, MPEG 1, MPEG 2, MPEG 3 (MP3). Windows Media Player is extremely easy to use as it has the same format as other Microsoft programs, such as MS Word where you go to the File menu and then to Open. Similar to MusicMatch it is capable of searching your hard drive for media files and adding them to your library but unlike MusicMatch it also has a 10-band audio equaliser which I find gives it a much better sound quality. Windows Media Player usually comes installed on your computer if you have a Microsoft Operating System. If you do not, or you have an older version it can be downloaded for free from the Internet. ...read more.

Conclusion

There are also some exemptions to the Data Protection Act where computer users do not have to register the data being held with the Data Protection Registrar: * Recreational use - This means that data held on a home computer regarding personal, family and household affairs does not need to be registered with the DPR. This would include the individual's own sensitive data such as details of medical health or past convictions. * Preparation of text documents - This exemption means that computer users are allowed to keep data, which will enable them to prepare documents. This would include data held on your home computer that you intended to write in a letter to the individual. * Accounts/Wages/Purchases/Sales - This means that data held on a computer for the purpose of preparing accounts such as sales and purchase ledgers, salary and pensions does not need to be registered. This includes information passed by an individual to their accountant for the preparation of their accounts. * Distribution of articles - This means that computer users are permitted to hold data on their computers without registering it if it enables them to forward correspondence to the individual. This would include a list of friend's names and addresses that you intended to send Christmas cards to. * Sports/Recreational club (not limited company) This exemption enables these types of establishment to hold individuals data without it being registered with the DPA. This will include membership details and possibly your bank details for the payment of the membership. There are also instances where the Data Protection Agency will release an individuals data but only if it is in the interest of preventing crime, prosecuting offenders, assessing tax or relating to health or social work. The DPA also has access to amend incorrect data, delete data that is no longer permitted to be held and access to pass data to the individual subject upon their request. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    Solutions are then found to certain problems which occur. Besides governmental uses, many marketers use data mining to find strong consumer patterns and relationships. Large organizations and educational institutions also data mine to find significant correlations that can enhance our society.

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    T2 2. T3 3. G2 4. G3 5. G4 6. G6 7. G8 8. G10 9. G12 10. G14 11. G16 12. G18 13. G20 14. Project Trainee 15. Temporary PAY SCALE LEVEL There is no sub-classification of Pay Scale Groups, which can be mapped to the Pay Scale Level.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    The BIOS itself includes user defined parameters and hence is not stored in ROM entirely. In fact the BIOS tends to be stored in a special type of RAM which is refreshed using battery power when the system is switched off.

  2. The impact of the availability of electric information on individuals and society

    It has many advantages against simple paper mails, because it's only a matter of seconds to send someone a message or to receive it; it also costs much less. According to NY Times the reason why video conferences, e-mails and intranet are getting more popular within non-public organisations is that

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    then carbon dioxide gas is let out of air vents in the ceiling of the computer rooms as each temperature sensor goes off to warn about a fire. This facility is turned off for routine fire alarms and is only activated when the temperature is way above normal body heat

  2. Identify the constituent parts of a total computer system.

    MICR (Magnetic Ink Character Reader) Magnetic ink characters are the strange looking numbers that appear at the bottom of cheques. These characters are used because they are very difficult to forge or damage. Banks use MICR to read the numbers from the bottom of cheques to obtain data such as account numbers and bank sort codes.

  1. Hardware and Software

    This package includes the following software: 1. Flash 8: An animation tool. 2. Dream weaver 8: A Web design application. 3. Fireworks 8: A graphics editor. 4. FlashPaper 2: PDF maker. 5. Contribute 3: The Web site manager. It introduces alpha channel video creation and provides new effects that animators

  2. LAN & WAN Protocols

    This the current way of deploying portable broadband internet to devices. You would normally find Wi-Fi connections in hotels, cafes & airports. People have started to use it at home aswell. Nearly all personal computer operating systems, game consoles, laptops, smart phones, printer and other peripherals support Wi-Fi.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work