• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

Unit 10 Server-side scripting of web pages part 2

Extracts from this document...

Introduction

Computer Systems Unit 2 Chris Young 5/11/2010 Table of contents P1 - 3, 4, 5, 6 P2 - 7, 8 P3 - 11, 12 P4 -13 P5 - M1 M2 M3 D1 D2 Resources http://www.itsky.com.au Explain the function of the system unit components and how they communicate Central processing unit - The Central Processing Unit (CPU) carries out the actual processing of data. The data it processes is gathered via the system bus, from the main memory. The CPU then sends back the results to main memory via the system bus. The CPU also controls and times the operations of the other key components. CPU's use in their operation: Fetch, decode, execute, and writeback. BIOS - The BIOS is a built-in software that decides what a computer can do without having access to a hard drive or CD/DVD. On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, serial communications, and a number of other miscellaneous functions. Motherboard - The motherboard is a printed circuit board (PCB) that houses and controls the components that are in charge of processing data. A motherboard provides the electrical circuit connections, these circuits are used by other components of the system to communicate. ...read more.

Middle

#5 Aero peek This feature allows you to make all open windows transparent this lets you view your desktop without minimising all your windows. This is another feature I love, I tend to save quite a lot of downloads to my desktop and being able to flick back and forth without minimising is great. #1 Snap #2 Taskbar #3 Thumbnail Previews #4 Jump List #5 Aero Peek Undertake routine maintenance tasks in relation to a PC. I will show you how to carry out several forms of maintenance, software, hardware and file management. Software maintenance To demonstrate software maintenance I'm going to update my antivirus. To start the process you first need to load up your antivirus (I'm using NOD32). Once the main antivirus window is open I need to navigate to the update option. Fortunately my antivirus does not need updating as my current virus signature database is up to date . This is what happens when it's not up to date, after a speedy download it will take me to the previous page and let me know if it's up to date. Hardware maintenance. To demonstrate hardware maintenance I'm going to find and use a printer that is connected to a separate computer on my network. ...read more.

Conclusion

Available utility software Utility software allows a user to analyze, configure, optimize and maintain their computer and should ned be confused with application software, this type of software allows us to create text documents, listen to music, browse the internet and much more. Utility Description Disk Defragmenters Locates files that are broken over different locations then moves the fragments to the same location to increase efficiency. Disk Cleaners This disk utility is designed to free up disk space and a computer's hard drive. It does this by searching and analysing the hard drive for files that are no longer of any use, it then removes the unnecessary files. Backup This involves making copies of important data so that these additional copies can be used to restore the original if it were lost or damaged. CLI and GUI CLI allows you to interact with a computer by typing commands in the text only interface. GUI is another way you can interact with a computer, instead of using a text interface it has a graphical interface that consists of icons. Registry Cleaners This utility was designed to remove registry entries that are no longer in use and are unwanted. Antivirus That is used to prevent and remove malware, including Worms, Trojan horses and computer viruses. ?? ?? ?? ?? 14 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    Expert systems may or may not have learning components but a third common element is that once the system is developed it is proven by being placed in the same real world problem solving situation as the human, typically as an aid to human workers or a supplement to some information system.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Processors perform differently because of their clock speed. Every computer has a 'clock' which generates 'pulses' that are used to control how the different components of a computer system work together. A 800 MHZ computer means that the system clock is generating approximately 800 million pulses every second.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Its small size and weight, impressive bandwidth and large spacing between repeaters make it a clear winner in guided communications for the foreseeable future. The media selections depends on many factors including: > The network type > The Cost > The distance of Transmission > The Security > The Error

  2. Smart Card System

    that are used for the encryption. These large numbers are the products of large prime numbers. Many encryption programs use one key for both encrypting and decrypting messages, which this is known as symmetric cryptography. This is a fast and simple method of encrypting messages and folders and is best for protecting local messages, files and folders.

  1. Explain the component parts of a computer system - Include both hardware, software and ...

    Floppy Disk - Floppy disks come in two sizes, 3.5 inch (known as a diskette) and 5.25 inch. Although the smaller floppy disk is in a hard case the disk inside is floppy. Both disks store binary data as a magnetic pattern on the disks surface.

  2. System I designed in order to produce a promotion package for her newly formed ...

    This creates a new number all the time, in access the AutoNumber option is used for that field. Also in cases like phone numbers, this is selected so that you have to enter the number in the correct format. These are some of the verification and validation techniques that I used.

  1. Analysis of Johnson Music

    There is an advantage to having multiple choice questions though, as statistics can be gathered easily from the questionnaire. There are two types of question on a questionnaire, which are open questions and closed questions. Open questions leave a space to allow for an answer to be written in.

  2. Ways of Promoting a Website

    browser as to how to display it, it allows common features such as headings and text paragraphs to share the same properties, thus meaning you can apply a style sheet to multiple pages at the same time, this is then more time efficient, and helps in aiding the user in creating a site that generates a certain "theme" throughout.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work