• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

Unit 10 Server-side scripting of web pages part 2

Extracts from this document...

Introduction

Computer Systems Unit 2 Chris Young 5/11/2010 Table of contents P1 - 3, 4, 5, 6 P2 - 7, 8 P3 - 11, 12 P4 -13 P5 - M1 M2 M3 D1 D2 Resources http://www.itsky.com.au Explain the function of the system unit components and how they communicate Central processing unit - The Central Processing Unit (CPU) carries out the actual processing of data. The data it processes is gathered via the system bus, from the main memory. The CPU then sends back the results to main memory via the system bus. The CPU also controls and times the operations of the other key components. CPU's use in their operation: Fetch, decode, execute, and writeback. BIOS - The BIOS is a built-in software that decides what a computer can do without having access to a hard drive or CD/DVD. On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, serial communications, and a number of other miscellaneous functions. Motherboard - The motherboard is a printed circuit board (PCB) that houses and controls the components that are in charge of processing data. A motherboard provides the electrical circuit connections, these circuits are used by other components of the system to communicate. ...read more.

Middle

#5 Aero peek This feature allows you to make all open windows transparent this lets you view your desktop without minimising all your windows. This is another feature I love, I tend to save quite a lot of downloads to my desktop and being able to flick back and forth without minimising is great. #1 Snap #2 Taskbar #3 Thumbnail Previews #4 Jump List #5 Aero Peek Undertake routine maintenance tasks in relation to a PC. I will show you how to carry out several forms of maintenance, software, hardware and file management. Software maintenance To demonstrate software maintenance I'm going to update my antivirus. To start the process you first need to load up your antivirus (I'm using NOD32). Once the main antivirus window is open I need to navigate to the update option. Fortunately my antivirus does not need updating as my current virus signature database is up to date . This is what happens when it's not up to date, after a speedy download it will take me to the previous page and let me know if it's up to date. Hardware maintenance. To demonstrate hardware maintenance I'm going to find and use a printer that is connected to a separate computer on my network. ...read more.

Conclusion

Available utility software Utility software allows a user to analyze, configure, optimize and maintain their computer and should ned be confused with application software, this type of software allows us to create text documents, listen to music, browse the internet and much more. Utility Description Disk Defragmenters Locates files that are broken over different locations then moves the fragments to the same location to increase efficiency. Disk Cleaners This disk utility is designed to free up disk space and a computer's hard drive. It does this by searching and analysing the hard drive for files that are no longer of any use, it then removes the unnecessary files. Backup This involves making copies of important data so that these additional copies can be used to restore the original if it were lost or damaged. CLI and GUI CLI allows you to interact with a computer by typing commands in the text only interface. GUI is another way you can interact with a computer, instead of using a text interface it has a graphical interface that consists of icons. Registry Cleaners This utility was designed to remove registry entries that are no longer in use and are unwanted. Antivirus That is used to prevent and remove malware, including Worms, Trojan horses and computer viruses. ?? ?? ?? ?? 14 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    Key Features The key features of a management information system are, * Confidence * Sustainability * Consistent timelines * Accuracy Key Elements The Management information system has five different aspects. These aspects are, * Date * People * Hardware * Software * Telecommunications Expert Systems An expert system is a

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Processors perform differently because of their clock speed. Every computer has a 'clock' which generates 'pulses' that are used to control how the different components of a computer system work together. A 800 MHZ computer means that the system clock is generating approximately 800 million pulses every second.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    As the media consider of wireless methods so the current suitability of communication channel from the above methods is the (WDM)

  2. Introduction to Viruses

    reason why awareness has increased is that people are starting to understand that denial- of- service attacks can be used to leverage other attacks that might at some point provide privileged access. A survey conducted by Digital Marketing Services found that 97 percent, or nearly all of its 1,014 online

  1. What is transaction processing?

    Also care needs to be taken in regards to the constant development of new software and is it always necessary to move and upgrade a business to the latest technology all of this could become a costly adventure and may not always be needed in order to develop a thriving business.

  2. Analysis of Johnson Music

    This way, every aspect of the company can be seen. A disadvantage of group discussions is that one or two people tend to dominate the whole discussion, meaning that the end result of the discussion could be biased towards the leaders of the discussion, and not everyone may get their opinions voiced properly.

  1. Ways of Promoting a Website

    can be modified/upgraded at vastly increased speeds, with little detrimental possibilities to already imposed code. The main detrimental effects of the CSS is the browser support it has, not only do differing browsers support its differing features but the lack of support can cause tremendous impact on the image of

  2. Flexible Architectures in Communication Security Application

    Cipher Kernel Bottleneck Analysis. Lisa Wu Page 21 4/22/01 are dependent on the previous stores. Having perfect alias detection does little for these codes as they still end up waiting on all previous stores. This is not the case for RC4, however, as this code performs many stores to an internal table used for key-based random number generation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work