• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Hardware and software.

Extracts from this document...


HARDWARE: INPUT DEVICES: Keyboards: The keyboard is the most common used input device, and it is used to enter commands and key in data. The keyboard is divided into four parts; -The function keys over the top -The letter keys in the main section -The numeric pad on the right -and finally the cursor movement and editing keys. Mouse: The mouse enables you to move the arrow cursor all over the page it is much easier to use the mouse then using the keyboard, you position the arrow on the item of your choice and press. Scanner: A scanner reads words, and pictures and then translates it into the pattern of light and dark into a digital camera and the computer stores it. The best type has to be the flat bed scanner which works in similar ways that to a photocopier. You put the page flat on the bed and then the sensor that like a photocopier, passes it translate into the computer. Digital camera: A digital camera is similar to a normal camera but that's only looks. The digital camera, instead of recording It, the camera converts light intensities into digital form that can be stored on a disk as a data file. Microphones: The microphones of a computer are just the same as of normal microphones. ...read more.


They are flat and are made of a substance called mylar. They have a magnetic surface which allows the recording of your data. Zip Drive: A zip drive is similar to a floppy drive but a zip drive works faster then a floppy drive a holds 100mb of data, that's 70 times more faster then a floppy drive. DVD Drive: DVD-ROM or (digital versatile disk, or disk read-only memory) is the same diameter as a CD but holds nearly 10 times the data. A DVD can hold between 4.7Gb and 15.9Gb data and, while it requires its own drive, the DVD drive can run the existing CDs. They have provided a way of watching digital-quality films or other entertainment. Backing up: Even if you save your work in a computer drive, you should keep the back-up copy. Most organisations would agree because they have large amounts of work to store so they do this process of backing up. OUTPUT DEVICEES: VDU: VDUs display images (characters or graphics) generated by the computer's video adapter. The image on the screen is referred to as 'soft copy'-you will lose it when the computer is turned off. Most VDUs use a cathode ray tube (CRT) which accounts for their size. Printers: when you need a hard copy of information on screen you will need a printer. ...read more.


It has been designed so that people don't have to waste time writing a letter when they can easily send through the E-mail. E-mails are known to be legal documents, you can be prosecuted if you write something that could be construed as libellous. Utilities: These programs provide diagnostic and measurement routines that check the performance of your computer. An e.g. of this is Anti-virus software which is a utility program that can scan any files for any virus, it can also detect a virus as well. PROGRAMMING LANGUAGES: Computers software is written in a programming language. Some are very complex and may require experts to use them. The two e.g. of these are C++ and Java. There are those languages which are produced by the computer automatically when writing macros. STAGES OF DEVELOPMENT: Before you can design or write a computer program, there are many stages of development that you must go through when doing this process, these are as follow; - Analysis of the requirement - what does the computer program need to achieve? - Design of solution. - Development of the program - probably broken down the into small subprograms. - Implementation and testing of the program, including training of the eventual users of the program. - Preparation of documentation, which will include documentation relating to the actual program and documentation for the users (i.e. a users' guide or manual). - Ongoing maintenance and development of the program. Ashraf Khawaja 12PAG ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * Maintenance of the network in long period may be high, and also long term running more computers are added to the network the performance will drop. Star Topology - Star topology is a central node with outlying nodes. In a star topology the messages are transmitted via a switch, hub or even a computer.

  2. Fetch Decode and Execute

    Decode the bit pattern in the instruction register 4. Perform the action dictated by the operand Using diagrams to aid me I shall be giving example as to how the fetch decode and execute cycle takes place. In my example I shall be using the fetch decode an execute cycle to perform a calculation of two digits.

  1. Hardware and Software

    a moving scanning head, the sheet fed scanner moved the paper past a stationary scanning head. Printer Printing quality is very important for designers/companies. Printing is a process for production of texts and images, typically with ink on paper using a printing press.

  2. Program Code Program DVD_Program; Uses Menuunit, CRT, dos; ...

    THIS PROCEDURE CANNOT BE UNDONE!') Write ('Erase all data? Y or N '); Readln ( response); If (response = 'y') or (response = 'Y') then Begin Assign (member, 'c:\pas\member.pas'); Rewrite (member); Close (member); Assign (video,'c:\pas\video.pas'); Rewrite (video); Close (video); Clear_Selected; Save_Screen; Draw_Shadow_Box (10, 10 70, 17); Gotoxy (12, 11); TextColor (red+blink); Writeln ('ALL DATA STORED ARE ABOUT TO BE

  1. Smart Card System

    Some of the benefits include: The ability to manage and control expenditures more effectively, fraud reduction, reduced paperwork and elimination of the need to complete redundant, time consuming forms. The potential of having one card with ability to access multiple services, networks and Internet.

  2. Flexible Architectures in Communication Security Application

    way into many popular software systems including SSH, OpenSSL, FreeBSD, and the Mozilla web browser. The optimized IDEA implementation was provided by Ascom, inventors of the algorithm. Operation of the algorithms can be tailored significantly, e.g., number of rounds, block size, and key size.

  1. Describe the hardware and software used to create and edit graphic images and compare ...

    Therefore the hard drive can have a direct impact on the graphics of the device. There are some drawbacks in some hard drives; cheaper ones have lower RPMs meaning that getting data off them takes longer. Hard disks eventually fails which stops the computer from working and regular crashes can

  2. Small Office Network Implementation - hardware and security.

    Traffic can then be rerouted within the network architecture to increase speed and functionality. Security Measures & Counter Measures Most security incidents occur because system administrators do not implement available countermeasures, and hackers or disgruntled employees exploit the oversight. Therefore, the issue is not just one of confirming that a

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work