• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The computer system

Extracts from this document...

Introduction

The computer system One of the main parts of a computer is the CPU- Central Processing Unit. It controls the computer as a whole but also handles the input of data in to the computer (memory) as well as processing the pieces of data held in the memory. The CPU is normally a small chip which is found on the main circuit board along with the memory. The Memory is also a key part in the computer system. ...read more.

Middle

1 KB =1,000 (1024) bytes * Megabytes (MB) 1MB =1,000,000 (1 million) bytes * Gigabytes (GB) 1 GB =1,000,000,000 (1 billion) bytes * Terabytes (TB) 1TB = 1,000,000,000,000 (I trillion) bytes RAM: Random Access Memory is the standard memory which is used to store programmes and data which is running at the time of use. At the end of a session when the computer is switched off it loses the all the data. ...read more.

Conclusion

Output devices are used to send information and data out of the computer. Storage is also an essential part of the computer system. You can get removable storage which includes CD's, DVD's, Floppy's, USB's and a few more. These enable the user to save data on to these devices and transfer them to other systems with out having to email or link the computers. The Binary code is a very complex system but is used by the computer system very easily. It uses two symbols to show the data and these symbols can be anything like dots and dashes. ?? ?? ?? ?? Assignment 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    FTP File Transfer Protocol is used to transfer data from one computer to another via a network similar to the internet. FTP is quite an insecure way of transferring data because there is not straightforward way of transferring data which is encrypted.

  2. Smart Card System

    the former, and historically newly explored computational approaches to finding large `probable' primes, such as the Fermat test, provide the latter.) Now E_K is easily computed from the pair (pq,e)---but, as far as anyone knows, there is no easy way to compute D_K from the pair (pq,e).

  1. Creating a computer system for Wooten Basset Rugby Club

    From the interview this is an outline of what the new system will have to achieve: * Produce template letters for a number of issues. These letters include Match details, which will tell players about a match its date, venue and other relevant information.

  2. Designing a computer system for the Enfield hotel.

    Rooms can also be booked 6 months in advance. What actually happens when booking a room is the following; * Customer asks to book room * Secretary asks the following, , when you would like to stay. , what type of room would you like. , for how many persons.

  1. File transfer protocols

    For each test, expected results should be noted. A Test Log indicates the results of each test run, whether the test is successful or not. If a test is successful and an error has been discovered then the code should be redesigned, amending pseudocode, recoded and retested.

  2. White Soul System Designs - creating a computer system.

    This then means the customer proving where they live when a letter and proving they identity with a passport or birth certificate. As you can imagine customers would not be very impressed with this and profits may suffer. Stock records can also be misplaced.

  1. Machine Shack Management System.

    What do you expect from the new system? I hope the new system can really do most of the work I do so it makes my job easier. I would also like it to be able to manage the items I have in stock and let me know when

  2. Identify the constituent parts of a total computer system.

    MICR (Magnetic Ink Character Reader) Magnetic ink characters are the strange looking numbers that appear at the bottom of cheques. These characters are used because they are very difficult to forge or damage. Banks use MICR to read the numbers from the bottom of cheques to obtain data such as account numbers and bank sort codes.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work