• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9

Hardware and Software requirements.

Extracts from this document...

Introduction

Hardware and Software requirements All ICT systems require Hardware and software in order to function. For the ICT system I am going to produce for a sole trader, the following requirements are essential for this Hardware * A CD-RW or DVD-RW is needed to save/backup large amounts of data in the event of corruption. It works by using microscopic bumps to store data. The surface of the CD disc is a mirror, and the bumps disrupt the mirror's perfect surface. The laser that reads the CD or DVD can detect the difference between a perfect mirror and an imperfection caused by. By identifying the bumps as a "1," and no bump as a "0," it is easy to store digital information on a CD or DVD. The bumps on a CD are molded into the plastic when it is produced, so they are permanent Files can be accessed on other computers and copied. Alternatives to this device are portable Flash drives, zip disc the old method of tapes and Floppy discs. * FDD to save/back up small files and to add small programs or updates to programs. * A fast CD-rom can be used to add further programs and utilities to enable better user accessibility. It can also be used to update existing software. * At least 40GB of hard drive to support programs and to save files. * A barcode scanner to scan UPC barcodes to identify the price of the product, a handheld barcode scanner for larger items. ...read more.

Middle

The "UPC" stands for Universal Product Code. This code is unique to each product. All UPC bar codes contain 12 digits with the first 6 containing the manufacturer's identification number. This is used on the full range of barcodes from a certain manufacturer so they can be easily identified. It is essential to use this system when a store is exporting products to foreign countries. The next five digits are the item number that identifies the product. The last digit is the check digit; this is very important because it enables the barcode scanner to determine if the barcode has been scanned correctly or not. It works the process out with a series of calculations. If the check digit the barcode scanner calculates is different from the check digit, the scanner knows that there has been an error and the item needs to be assessed and rescanned. This barcode is from a product produced by BYG publishing, which is a book company Communication Infrastructure Many companies used to use the Fax machine to send alphanumeric data to each other. This technology was particularly useful because it could also be used to transfer drawings. A fax machine works by scanning the data with a beam of light; the light is then converted into an electronic signal that is passed along the telephone line to the recipient's machine, which is then printed out. ...read more.

Conclusion

If an incident involving the products arose, this information would make it easy to track the source of the problem - and recall the products. * Thanks to the RFID when the palettes arrive at the unloading area there is no need to check the contents of the packages. The stock control program describes the cargo and is quickly taken to the appropriate truck. * Meanwhile the supermarket has been tracking the shipment thanks to its own connection to the stock control system. When the delivery arrives it passes trough their own loading dock readers. * As soon as the products arrive, the supermarket retail systems are automatically updated to include every product that has arrived. Thanks to this the supermarket can locate its entire product range from that manufacturer inventory this is all done accurately and automatically. * Inside the supermarket the shelves will contain their own independent readers, when the products are stocked, the shelves will understand what's being put in them. Now, when a customer grabs for example 6 cans of drink, the shelf will send a message to the supermarket's automated re-fill systems - which will order more cans of drink from the manufacturer. * Auto-ID makes the customers shopping trip easier, too. Rather than queue for a cashier, the customer can simply walk out the door with their purchases. A reader built into the door recognizes the items in her trolley by their individual EPCs; the customer can then swipe a debit or credit card and then exit. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    console click "targets" > "Add" > "select Single host" and fill the host IP address or name press "OK" as the figure (In this coursework, I enter IP address of Cisco router 203.86.133.1 as the target host) Step 3: Fine Tune Port Scan Options In session properties screen of Nessus console click "Port Scan" > select "Privileged ports (1-1024)"

  2. Explain the component parts of a computer system - Include both hardware, software and ...

    They are used to store the operating system, applications software and data files. Hard disks are able to store far more data than floppy disks and access is also much faster. Hard disks can be many sizes from 1 Gb up to 100 Gb(s).

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    These numbers are then coded into a series of on-or-off electrical pulses (in some systems they may be strictly high-or-low pulses), in very much the same way that letters of the English language were coded into the dots and dashes of Morse code.

  2. The Von Neumann Machine

    CPU checks whether it is an instruction. The contents of MBR is copied to CIR and is decoded. Execute cycle (1) MAR is set to [12] (2) The contents of the Accumulator is transferred to MBR (3) Control unit sends a write signal to memory address to write to the

  1. Smart Card System

    but the distances are limited, and there is also a limit on the number of computers that can be attached to a single LAN. File Transfer Protocol (FTP), User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are commonly applies in LANs' transactions.

  2. Introduction to spreadsheets

    1 How many have been sold -Formula By adding a products It will show how much of the product we have sold. The formula used does work 2 Will it go on offer - Formula By adding a products This will tell you if this product needs to go on offer.

  1. Hardware and Software

    It is often carried out as a large-scale industrial process, and is an essential part of publishing and transaction printing. These are mostly used for the printing of flyers, sales material and to the designing of photographs. Printer can be connected through a USB cable or sometimes there is no cable required, they can just be connected via local network.

  2. Flexible Architectures in Communication Security Application

    Breakdown of Cipher Operations. Lisa Wu Page 25 4/22/01 Chapter 4 Architectural Extensions Figure 8 lists the additions we made to the instruction set to support fast execution of symmetric secret-key ciphers. A number of important considerations drove the design of these instructions.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work