• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Hardware and Software requirements.

Extracts from this document...

Introduction

Hardware and Software requirements All ICT systems require Hardware and software in order to function. For the ICT system I am going to produce for a sole trader, the following requirements are essential for this Hardware * A CD-RW or DVD-RW is needed to save/backup large amounts of data in the event of corruption. It works by using microscopic bumps to store data. The surface of the CD disc is a mirror, and the bumps disrupt the mirror's perfect surface. The laser that reads the CD or DVD can detect the difference between a perfect mirror and an imperfection caused by. By identifying the bumps as a "1," and no bump as a "0," it is easy to store digital information on a CD or DVD. The bumps on a CD are molded into the plastic when it is produced, so they are permanent Files can be accessed on other computers and copied. Alternatives to this device are portable Flash drives, zip disc the old method of tapes and Floppy discs. * FDD to save/back up small files and to add small programs or updates to programs. * A fast CD-rom can be used to add further programs and utilities to enable better user accessibility. It can also be used to update existing software. * At least 40GB of hard drive to support programs and to save files. * A barcode scanner to scan UPC barcodes to identify the price of the product, a handheld barcode scanner for larger items. ...read more.

Middle

The "UPC" stands for Universal Product Code. This code is unique to each product. All UPC bar codes contain 12 digits with the first 6 containing the manufacturer's identification number. This is used on the full range of barcodes from a certain manufacturer so they can be easily identified. It is essential to use this system when a store is exporting products to foreign countries. The next five digits are the item number that identifies the product. The last digit is the check digit; this is very important because it enables the barcode scanner to determine if the barcode has been scanned correctly or not. It works the process out with a series of calculations. If the check digit the barcode scanner calculates is different from the check digit, the scanner knows that there has been an error and the item needs to be assessed and rescanned. This barcode is from a product produced by BYG publishing, which is a book company Communication Infrastructure Many companies used to use the Fax machine to send alphanumeric data to each other. This technology was particularly useful because it could also be used to transfer drawings. A fax machine works by scanning the data with a beam of light; the light is then converted into an electronic signal that is passed along the telephone line to the recipient's machine, which is then printed out. ...read more.

Conclusion

If an incident involving the products arose, this information would make it easy to track the source of the problem - and recall the products. * Thanks to the RFID when the palettes arrive at the unloading area there is no need to check the contents of the packages. The stock control program describes the cargo and is quickly taken to the appropriate truck. * Meanwhile the supermarket has been tracking the shipment thanks to its own connection to the stock control system. When the delivery arrives it passes trough their own loading dock readers. * As soon as the products arrive, the supermarket retail systems are automatically updated to include every product that has arrived. Thanks to this the supermarket can locate its entire product range from that manufacturer inventory this is all done accurately and automatically. * Inside the supermarket the shelves will contain their own independent readers, when the products are stocked, the shelves will understand what's being put in them. Now, when a customer grabs for example 6 cans of drink, the shelf will send a message to the supermarket's automated re-fill systems - which will order more cans of drink from the manufacturer. * Auto-ID makes the customers shopping trip easier, too. Rather than queue for a cashier, the customer can simply walk out the door with their purchases. A reader built into the door recognizes the items in her trolley by their individual EPCs; the customer can then swipe a debit or credit card and then exit. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. I have been given the task to design a database for a company called ...

    So the smallest value you can enter is 1 centimeter and the largest you can enter is 150 centimeters. It also means this it won't be possible for the user to enter in a negative number. * The maximum weight of any one consignment is 200kg.

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    console in the NessusWx tools bar click "session" > "new", enter the session name for report reference and click "Create" as the figure. (In this coursework, my target host for vulnerability scanning is Cisco 1814 Router of Asiaworld-expo) Step 2: Fine Tune Session Properties In session properties screen of Nessus

  1. Hardware and software ICT revision notes

    * directory structures (folders). MS-DOS stands for Microsoft Disk Operation System. It is a command - led system, which means that you operate it by keying in command codes. For example the command copy c:\letter.doc a: would be required to copy a file called letter from the hard drive to a floppy disk.

  2. Flexible Architectures in Communication Security Application

    We then calculate encryption rate by synthesizing the models to obtain timing estimates. Our systematic approach allowed us to study the tradeoffs between chip area and performance. We showed that the highest-performing and most cost-efficient design is the 4-wide combining configuration.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    The port authorities used to find the shape of the bottom of the harbour, so that ships could navigate more safely. It certainly wasn't possible to drain the harbour and take a photograph of it, so what they did instead was send out a boat which travelled slowly across the harbour.

  2. Explain the component parts of a computer system - Include both hardware, software and ...

    The quality of the print is higher than that of dot matrix printers but not a good as laser printers, as the resolution is not as high. Therefore, they are priced somewhere in-between the two. These printers are also a lot quieter than dot matrix printers as there is no impact between the printer and the paper.

  1. Introduction to spreadsheets

    1 How many have been sold -Formula By adding a products It will show how much of the product we have sold. The formula used does work 2 Will it go on offer - Formula By adding a products This will tell you if this product needs to go on offer.

  2. Smart Card System

    Otherwise, the end node transmits the Idle_Up control signal. 1. The repeater polls all local ports to determine which end nodes are requesting to send a data packet and at what priority level that request is (normal or high). 2.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work