• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The CPU (Central Processing Unit) is the processor within the computer

Extracts from this document...

Introduction

The CPU (Central Processing Unit) is the processor within the computer. It is a microchip which carries out all of the searching, sorting, selecting and calculating within the computer. The CPU also has an internal clock which determines the maximum speed at which everything within the computer is done. CPUs run at different speeds measured in MHz. The Intel Pentium 4 shown above runs at a maximum of 2.2GHz. The most common CPUs in PCs are Celeron Processors and Pentium Processors both made by Intel. The CPU is plugged into the motherboard enabling it fast access to all devices especially ROM and RAM chips. Main Processing Unit Devices - Motherboard The Motherboard is the heart of the computer, into which everything plugs. When you buy a computer it usually has a Motherboard which already has a CPU, RAM, ROM, Ports and Connecting leads. The Hard Disk Drive and Floppy Disk Drive are connected directly to the Motherboard. Usually there are also a number of spare slots to attach additional devices such as RAM, Sound Cards etc. These spaces are known as expansion slots. An advantage of Motherboards is that they make it easier to upgrade an existing computer rather than buying a whole new PC. ...read more.

Middle

It has a port which allows for a suitable connector and cable to then connect the PC to a network device. Storage Devices - Floppy Disk These are cheap ways of storing things but can only hold 1.44 Mb of data. Inside the plastic casing is a small disk which has a surface which can store magnetic patterns. When inserted into the computer, the metal sleeve slides across to reveal a part of the disk to a read/write head. The disk spins round within its casing and the head can move back and forth. Casings come in different colours but the most common are black and blue. Most computers have a floppy disk drive and this means the floppy disk is a cheap way of moving or copying small amounts of data from one computer to another. They can also carry computer viruses between computers so BEWARE! Storage Devices - Hard Disk Hard Disks have the capacity to store lots of data. The one in the picture above can store 10Gb. Hard Disks have a smooth surface which, like floppy disks, can be magnetised so they can be used to store data over and over again. Hard Disks are usually fixed inside the computer and are connected to the Motherboard with a ribbon cable. ...read more.

Conclusion

Once produced or 'pressed' a standard CD ROM cannot be overwritten. CD ROM shares the same technology as Audio CDs so an Audio CD can be played in a computer CD ROM Drive. Data CD ROMs should not however, be used on Audio equipment. A DVD ROM is able to store a massive amount of data, typically about 4.3Gb. This is roughly the same as about 6 or 7 CD ROMs! DVD ROM technology was originally designed to hold high quality video. DVD ROMs store data optically. Once placed in a DVD ROM Drive the DVD rotates and a laser light moves back and forth to read the information. Information can be stored on both sides of the disk unlike CD ROM which can only store information on one side. DVD drives operate at different speeds which means the speed at which data can be retrieved varies. The quality of the laser also affects the performance. DVD ROMs often hold information like movies in an encrypted format. This is to try and stop pirate copies of copyright material being made. Many DVD ROM Drives are fitted inside the casing of the Main Processing Unit with a cable connecting the drive to the Motherboard. Once 'pressed' with new data DVD ROMs cannot be erased and refilled with different data. It is generally accepted that DVD ROM technology will replace CD ROM technology in the next few years. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    PAN could be wired with a USB pen or even a wireless PAN can be setup using technologies such as IRDA, Bluetooth and zigbee. Bluetooth standard is related to PAN because it is a wireless protocol which exchanges data over short distances from fixed and mobile devices which make up the PAN.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    The CPU will also use this place to store the results of any processing it does. It is made up of individual memory locations, each capable of storing a byte of data. The parts of the operating system, which the computer is using at the time, also need to be stored in memory.

  1. Free essay

    Hardware and Functions of a Micro Processor

    Adding numbers in a computer system is often done on the processor in the Arithmetic Logic Unit, this will be described later. But if we wish to use binary values we can sue a form of logic gate called an adder, there are two types of adder, half and full.

  2. AQA Computing CPT3

    Price is too high - price will not V 018 (Customer 5) 1. Set price to 010.0p 2. Begin fuelling (until 100L dispensed) 3. Stop fuelling 4. Replace nozzle 5. Reset pump 1. Set price to 010.0p 2. Begin fuelling (until 100L dispensed)

  1. What is transaction processing?

    place a blank bank card and type in the accessed number enabling access to an individuals account. Via the use of the internet hacking a targets PC via the use of a trogon or sub seven program could enable the hacker to access personal details such as credit card numbers,

  2. Flexible Architectures in Communication Security Application

    Section 5.1 System Architecture Figure 10 details the high level architecture of the CryptoManiac (CM) processor. The host processor interfaces to the CM through the input (InQ) and output (OutQ) request queues. Cryptographic processing requests are inserted into the InQ by a host processor over a connecting bus.

  1. Batch Processing

    Transactions are usually validated as the operator keys them in. Any errors that are found can be reported and corrected straight away. Sorting: The data in the transaction file is sorted into order using the same primary key field as the master file.

  2. Smart Card System

    Individuals who practice this field are known as cryptographers. Cryptography mainly consists of four objectives: * Confidentially - The information cannot be understood by anyone. * Integrity - The information cannot be altered in storage or transit between sender and receiver. * No-repudiation - The creator or sender of the information cannot deny his intentions in the creation or transmission of the information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work