• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the function of computer hardware components

Extracts from this document...

Introduction

Transfer-Encoding: chunked P1 - Explain the function of computer hardware components Computer A computer is an electronic device which handles information or data. The computer sees this information in 1?s and 0?s but can change it into more complex things like a photo, website or game. Computers use a combination of hardware and software. The hardware contains all of the internal components like the processor and the motherboard and even external components like the monitor and keyboard. The software is anything that gives the hardware a set of instructions, for example, web browser or word processor. Computers do not just have to be the desktop or laptop computers. Tablets, phones and game consoles are also types of computers although they do not do as many tasks as a desktop or laptop computer can do. Hardware Hardware is the physical components that make up a computer system. Hardware in a computer includes, the processor, motherboard, BIOS, heat sink, fan, IDE, SATA, parallel and serial ports, ROM, RAM and cache internal memory, hard drive, network card, graphics card and the power supply. All of these components communicate with each other and the software allowing tasks to be completed by the user. Processor The processor more known as the CPU (Central Processing Unit) ...read more.

Middle

Each IDE ribbon, attached to either controllers can support two drives. To know which data relates to which drive it is identified as the master or slave drive. The master drive deals with all the traffic on the IDE cable. Its controllers recollects its own data and passes on data to the slave drive. The slave drive only sees the data that is passed on from the master drive. SATA SATA stands for serial advanced technology attachment. This is a computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives. It transfers data between the motherboard and other devices. Ports Parallel and serial ports are types of data buses. A serial port is used to connect a serial device to the computer (for example, a modem and some computer mouse?s) and capable of transmitting one bit at a time. A parallel port is used to connect a parallel device to a computer (for instance, a printer) they can carry more data because they don?t need to be split using a single bus file. Parallel sends and receives and serial just sends data, and it doesn?t receive. ROM ROM stands for read-only memory. It is a type of storage used in computers and other electronic devices. ...read more.

Conclusion

In addition, unlike floppy disks they are immune to magnetic interference. USB flash drives use the USB mass storage standard which is supported by operating systems like OS X, windows and other systems alike. A flash drive has a small printed circuit board which holds the circuit?s elements and a USB connector which is protected with a metal, plastic or rubber case. If the USB gets too hot or too cold it could affect many things. For example, corruption of data, if the USB gets overly hot, data which is stored on the USB will be corrupted. Additionally, when the microscopic connections inside a flash drive get too hot or too cold it may have trouble passing the information to or from the drive, therefore there could be a slow response time. Furthermore, the computer may not be able to access the drive or it can be listed and disappears shortly after. Floppy and Disk Drives A floppy disk is a small removable storage sealed in a rectangle plastic carrier which is lined with fabric which removes dust particles. They were used to distribute software, transfer data, and create backups however, they are not used much today due to better quality storage devices like USB?s. Because a floppy disk is made of thin plastic they can be broken very easily. In addition, putting the floppy disk on a magnetic field may corrupt the data which is already stored on the disk ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Processes: - All records of returned rentals will be placed into the rental archive file automatically file automatically. 10. Age of customer calculated automatically Inputs: - Date of Birth, today's date.

  2. The Impact of Mobile Phones on social Interaction

    References 1. BBC News Sci-Tech - The future is mobile (URL: http://news.bbc.co.uk/hi/english/sci/tech/newsid_470000/470027.stm) [28 March 2002] 2. House of Commons - Sciences and Technology - Third Report (URL: http://www.parliament.the-stationery-office.co.uk/pa/cm199899/cmselect/cmsctech/489/48905.htm#a2) [20 March 2002] 3. FT.com - UK Budget'99 (URL: http://specials.ft.com/ln/budget99/23216.htm) [18 March 2002] 4.

  1. Artificial Intelligence.

    Q. Do You Drink Wine? A. No As the problem is to find out what sort of wine is drank on average, the expert system knows from the above answer that there is no need to commence on asking any more questions as they do not drink wine therefore no other questions are going to be appropriate.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    * The user must be able to generate reports including a list of all customers, orders and products.. * The user must be able to generate a report showing product demand to date for the current month and for the current year.

  1. Threats to Data

    not really mean any harm and have no intention of using the information they gain. Unfortunately they may not be as clever as they think and may accidentally do damage. The second group of hackers try to access machines simply to cause damage.

  2. Explain the function of the system unit components and how they communicate

    It can also be called Information Retention. The other type is RAM, or Random Access Memory. This is mainly used by storing files that can be processed by the CPU. Backing Storage Backing storage is a device that can store data for portable use, connecting by USB or FireWire.

  1. Evaluate the performance of a computer system and explain and justify improvements that could ...

    This keyboard costs £39.00 which isn’t too expensive. Alternatively, it may be useful to purchase stickers for the keyboard. Keyboard stickers have large print, high contrast (for example, black lettering on a white or yellow background) and Braille lettering. They are suitable if you find standard keys difficult to see.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    They could use, steal and damage information. Offences under the act include hacking, unauthorised access to computer systems and purposefully spreading malicious and damaging software (malware), such as viruses. This was then broken down into 3 parts: * Unauthorised access to computer programs or data (level 1)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work