• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What is a computer?

Extracts from this document...

Introduction

What is a computer? 1.Data Data has no meaning Information=data + meaning Computers are machines that process data 2.Computerised vs. manual systems... Using a computer system has lots of benefits A. Takes up a lot less space. B. Searching for records is very quick. C. More than one person at a time can access the same data from their network PC. D. It saves to the computers memory. E. Reports can be generated very quickly. ...read more.

Middle

They are not secure and unauthorised users can hack into your computer. Network security Access security limits a persons network A. All authorised users should be given usernames and should create their own passwords. B. Users should change their passwords frequently. C. Individual users can be assigned access rights for example network managers can be given to access software that controls how the network runs. ...read more.

Conclusion

D. Archiving means coping or moving a file somewhere for long-term Physical security protects hardware Follow the seven sad flab rules a. Serial numbers- Keep a record of all serial numbers b. Alarm- Computer rooms should be protected by alarms c. Doors- lock doors d. Fire protections- Use smoke alarms and fire doors e. Lock- Lock widows to prevent access f. Avoid- having computers on the ground floor g. Blinds- or curtains should be closed at night and monitors should be switched off ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Sender of a UDP does not assure the state of UDP message once. If any kind of reliability is needed for the message transmission than it is all implemented in upper layers. IEEE 802 Institute of Electrical and Electronics Engineers 802 is the standard which looks after LAN and metropolitan area networks.

  2. Smart Card System

    number is required to make emergency contact to students Attributes Description Form Name: Student Address Description: This attribute contains the Student's Address Element Characteristics Length: 50 Dec. Pt.: None Input Format: 50(30) Output Format: 50(30) Default value: 50 [ ] Continuous or [ ] Discrete [ ] Alphabetic [?] Alphanumeric

  1. Flexible Architectures in Communication Security Application

    For a 32k session length, secret-key processing overheads rise to 48% of overall run time. Given that a single session will be composed of many web objects, cryptographic processing will be quickly dominated by secret-key cipher execution. To further reduce the cost of public-key authentication, SSL allows the use of

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    This should not be the case if the system is delivered to their exact requirements. * Will it be easy enough to back up data files encase of a program failure which could result in the program being dropped for alternatives.

  1. Creating a computer system for Wooten Basset Rugby Club

    1.4 Data Requirements From the interview it has become apparent that I will need to store a considerable amount of data. I have divided this data into the following groups: Players, Fixtures, Rivals, Rival Players, Players-Fixtures and Rival Players-Fixtures. A primary key will be used in every case to uniquely

  2. Outline the process a PC follows once it has been switched on?

    As the system BIOS is small it can only hold data for its own execution and not for other devices. Therefore it actively seeks other devices BIOS's to execute. This explains why a PC may have more than just one BIOS.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work