• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the function of computer hardware components

Extracts from this document...

Introduction

Transfer-Encoding: chunked P1 - Explain the function of computer hardware components Computer A computer is an electronic device which handles information or data. The computer sees this information in 1?s and 0?s but can change it into more complex things like a photo, website or game. Computers use a combination of hardware and software. The hardware contains all of the internal components like the processor and the motherboard and even external components like the monitor and keyboard. The software is anything that gives the hardware a set of instructions, for example, web browser or word processor. Computers do not just have to be the desktop or laptop computers. Tablets, phones and game consoles are also types of computers although they do not do as many tasks as a desktop or laptop computer can do. Hardware Hardware is the physical components that make up a computer system. Hardware in a computer includes, the processor, motherboard, BIOS, heat sink, fan, IDE, SATA, parallel and serial ports, ROM, RAM and cache internal memory, hard drive, network card, graphics card and the power supply. All of these components communicate with each other and the software allowing tasks to be completed by the user. Processor The processor more known as the CPU (Central Processing Unit) ...read more.

Middle

Each IDE ribbon, attached to either controllers can support two drives. To know which data relates to which drive it is identified as the master or slave drive. The master drive deals with all the traffic on the IDE cable. Its controllers recollects its own data and passes on data to the slave drive. The slave drive only sees the data that is passed on from the master drive. SATA SATA stands for serial advanced technology attachment. This is a computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives. It transfers data between the motherboard and other devices. Ports Parallel and serial ports are types of data buses. A serial port is used to connect a serial device to the computer (for example, a modem and some computer mouse?s) and capable of transmitting one bit at a time. A parallel port is used to connect a parallel device to a computer (for instance, a printer) they can carry more data because they don?t need to be split using a single bus file. Parallel sends and receives and serial just sends data, and it doesn?t receive. ROM ROM stands for read-only memory. It is a type of storage used in computers and other electronic devices. ...read more.

Conclusion

In addition, unlike floppy disks they are immune to magnetic interference. USB flash drives use the USB mass storage standard which is supported by operating systems like OS X, windows and other systems alike. A flash drive has a small printed circuit board which holds the circuit?s elements and a USB connector which is protected with a metal, plastic or rubber case. If the USB gets too hot or too cold it could affect many things. For example, corruption of data, if the USB gets overly hot, data which is stored on the USB will be corrupted. Additionally, when the microscopic connections inside a flash drive get too hot or too cold it may have trouble passing the information to or from the drive, therefore there could be a slow response time. Furthermore, the computer may not be able to access the drive or it can be listed and disappears shortly after. Floppy and Disk Drives A floppy disk is a small removable storage sealed in a rectangle plastic carrier which is lined with fabric which removes dust particles. They were used to distribute software, transfer data, and create backups however, they are not used much today due to better quality storage devices like USB?s. Because a floppy disk is made of thin plastic they can be broken very easily. In addition, putting the floppy disk on a magnetic field may corrupt the data which is already stored on the disk ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Processes: Any records of a staff member whose employment is terminated will automatically be placed into the staff archive file. 9. Archive form for rentals Inputs: - Any rental record of vehicle rentals Data Collection: - The data is placed into a rental archive file when a vehicle rental has

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Suggestions for Improvements In the usability of this website I do not think there is anything that the website can improve, apart from, as mentioned earlier, the Frequently Asked Questions section. I believe there is nothing else to improve, because the business managed to create a very simple and easy

  1. Marked by a teacher

    Ecommerce Case Study

    to receive their product and may be encouraged to use other company?s meaning cuckoo games will loose custom. Shopping through ecommerce does not allow the customer to experience the product before purchasing it. In the majority of game stores there are consoles set up with the latest games in order for the customers to try and encourage them to purchase.

  2. Threats to Data

    by a third party, or where a third party provides a secure payment mechanism. In such cases all data controllers should be identified and transactional website must make sure that all of them are located within the EEA. The Computer Misuse Act This became law in 1990 to combat the growing problem of hackers.

  1. The Impact of Mobile Phones on social Interaction

    This has led to fears that the traditional 9-5pm work day is now a myth and this may have a direct impact on producing an over-worked society with an increase in problems such as stress as a direct result. Finally, the focus group research conducted on the 13-18 year age

  2. Using ICT to communicate

    two images within it, try and use up some of the space. Page seventeen has a title in bold and then has a full page of paragraphed text that contains no headings to any of the paragraphs. Page eighteen is setup landscape instead of portrait it is titled and then

  1. ict as level coursework

    All of the information that is filled in automatically transfers to the 'customer details' spreadsheet which means that all this information does not have to be keyed in twice. Once all of this information is complete and you want to go to the next page click the 'go shopping button'.

  2. Artificial Intelligence.

    Q. Do You Drink Wine? A. No As the problem is to find out what sort of wine is drank on average, the expert system knows from the above answer that there is no need to commence on asking any more questions as they do not drink wine therefore no other questions are going to be appropriate.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work