• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Form and Function In Design Technology

Extracts from this document...

Introduction

Form and Function in Design Technology FORM: m. I .The shape of something, its outward appearance 2. Its structure. FUNCTION: it. .The special activity or purpose of a person or thing. It has been argued that "Form follows Function" with reference o two similar products that you have studied discuss to what extent you believe this to be true. Nothing epitomises modern life better than the computer. For better or for worse computers have infiltrated every aspect of our society. They are becoming increasingly a larger part of our life, we use them in our jobs, our homes, for work, for recreation and for communication. As they are so important in modem day living the look of the computer is essential, aesthetics is everything. Designers are becoming more and more ambitious in the design of the computer as the technological advances keep arriving. From the early Harvard-IBM Automatic-Sequence Controlled Calculator to the modem day IMAC, computers have advanced, and so has their design. The evolution of the computer is split up into four stages, from the first generation to the forth. First Generation Computers. (1945-1956) With the onset of the Second World War, governments sought to develop computers to exploit their potential strategic importance. ...read more.

Middle

They also contained all the components we associate with the modem day computer: printers, tape storage, disk storage, memory, operating systems, and stored programs. One important example was the IBM 1401, which was universally accepted throughout industry, and is considered by many to be the Model T of the computer industiy. By 19(5, most large business routinely processed financial information using second generation computers. Second generation computers were the first to be cost effective and productive for business use. The stored program concept meant that instructions to run a computer for a specific function (known as a program) were held inside the computer's memory, and could quickly be replaced by a different set of instructions for a di fTerent function. A computer could print customer invoices andl minutes later design products or calculate paychecks. Third Generation Computers (1964-1971) Though transistors were clearly an improvement over the vacuum tube, they still generated a great deal of heat, which damaged the computer's sensitive internal parts. The quartz rock eliminated this problem. Jack Kilby, an engineer with Texas Instruments, dleveloped the integrated circuit (IC) in 1958. The IC combined three electronic components onto a small silicon disc, which was made from quartz. Scientists later managed to fit even more components on a single chip, called a semiconductor. ...read more.

Conclusion

With the iMac, Apple has redefined a computer's form, while making sure people could still recognise it as a computer. From first impressions, the thing that will strike you most about the iMac is the all-in-one monitor and computer design, although this is not new. Infact, this is a hallmark design feature of Apple going back to the first Macintosh in 1984. In the creation of the iMac, ives took a historic form and brought it into the modern day. The iMac is governed by what the consumers want, and that is perhaps why it becamee so successful. Firstly people wanted a smaller and more portable computer, especially in Europe and Asia where living spaces are smaller. The handle on the back of the machine invites people to pick it up and touch it and the few cables that connect to the machine make it easier to set up and avoid the need for complicated documentation. They have designed it in a simple and elegant way, this was to try and make people less afraid of computers, they wanted the iMac to be "approachable" "The idea that the i2vlac comes in one box, has clear plastic that catches the light and shows its changing nature and has a shape that looks like it just arrived all contribute to the overall approachability and appeal of the machine. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    Table design: I will have separate tables for each of the above entities being linked by the relationships shown on the previous page. Some of the tables will need input masks to make sure that the data which is inputted is correct, this will also help the system to meet the data protection act of keeping data accurate.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    An example of a company that would have a huge budget would be Microsoft. They have many employees and are able to expand in certain things as in the amount of computers. A charity like Oxfam would not be able to expand which would mean they would only have a few computers and employees.

  1. Implementing New Technology In To A Business

    Organisations can change the way they sell their products to see what method is best suited. They could use catalogues which are cheaper then showing your products in shop, but they are still dear to produce, websites could be used and over the phone.

  2. Logo design

    Final Logo The logo I have chosen to use is: Logo build What software I used AO1A I used www.logoyes.com What software I could have used AO1O, AO1L I could have used paint or photo shop. Why I selected the software I did AO1K Because it was easy to use

  1. Smart Card System

    to try, then we have no reason not to trust this method also. In MD5 Message Digest Authentication (higher authentication method), the password is not passed over the network at all. Instead, a series of numbers is generated based on the password and other information about the request, and these numbers are then hashed using MD5.

  2. Flexible Architectures in Communication Security Application

    { t0 = (sbox1[x[jj][0]] � sbox2[x[jj][1]] � sbox3[x[jj][2]] � sbox4[x[jj][3]]); t1 = (sbox1[x[jj�1][3]] � sbox2[x[jj�1][0]] � sbox3[x[jj�1][1]] � sbox4[x[jj�1][2]]); x[jj�3] = x[jj�3] <<< 1; x[jj�2] = x[jj�2]�(t0+t1+key[ii<<1]); x[jj�3] = x[jj�3]�(t0+(t1<<1)+key[(ii<<1)+1]); x[jj�2] = x[jj�2] >>> 1; } output[0] = IV[0] = x[2] � key[0]; output[1] = IV[0] = x[3] � key[1];

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    * Labels - make sure labels display the correct text and they are position correctly. * Error messages - make sure error messages work and in the way they are supposed to do. * Combo boxes and check boxes Performance testing This makes sure the system can cope with large

  2. Definition-nature of the problem solved - Car Mechanic business

    critical errors as long as the business remains at a steady rate. It is only when increased customers bring an increase in the amount of data that the system will be prone to mistake. This is the main fault with the current system.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work