Back up Systems.

Back up Systems Backing up is the activity of copying files to a second medium (a disk or tape) as a safety measure in case the first medium fails. Even the most reliable computers are able to break down. The reasons for data loss would be because of fire, theft, virus attacks, sabotage, power failure and explosion. Section 1 At the moment, the school is using tape drives which can be set to back up automatically, at any day and at any time. The school has three drives, which are the S: drive, the T: drive and the U: drive. The S: drive and the U: drive are all being backed up by the tape drives, however the T: drive isn't. Up to this point, they have been using a grandfather-father-son backup system. However, the data on the network is not being backed up every day. The strengths of there current back up system is, they are using the latest backup software called Veritas which uses tape drives and which can be set to back up automatically, at any day and at any time. The weaknesses of there back-up system are that, the grandfather-father-son backup system, does not backup the data every day. This means, if the network completely crashes on a particular day, the data added to the network on this particular day will all be lost. Also at present, the school has a number of software programs, which is just lying about, and can easily go missing due to theft. Section 2

  • Word count: 1051
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

uses of ICT in a company

Contents . Terms of Reference 2. Procedure 3. Introduction 4. ICT system used 5. Table of components 6. The Components used by St Georges 7. How the Bespoke system is used and software applications 8. How the components are linked 9. Conclusion ) Terms of Reference This report has been written by Jack Michaels at the request of John Gaulding and it is to be written about St Georges and the uses of ICT in the company. 2) Procedure The report will look at the systems, software and hardware used by St Georges to successfully run a business, and the information which I will be using has been supplied to me by Mr John Gaulding from St Georges and also the St Georges website 3) Introduction This report will show the way that St Georges run and maintain a lucrative and successful business. St Georges has several branches and is a business of 50 staff strong 3.1) Aims and Objectives St Georges obviously aim to give the highest possible care and treatment to the animals they treat as they can. There other main object is to make a large profit, so they can keep treating the animals, and keep expanding their business. They also aim to sell high quality products and have good customer relations. In order to do this they need to employ the right staff and have a good range of high quality equipment. 3.2) Core Business All of the St Georges clinics contain the only

  • Word count: 2112
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

ICT Coursework - Big M Cinemas

GCSE ICT Coursework - Big M Cinemas Introduction My assignment was to design a full web-page advertisement for a cinema. It should be attractive and easy to update and timings change. My extension was to create a web booking system/User documentation. I had a choice of six other categories in the Big M Cinemas coursework but chose this one because its what I thought I could achieve best at. The giving time for my project was nine weeks to do the primary task, extension and report. I had a choice of which software I used and how I did the project (there was no software restrictions). When designing my web page, I need to make sure that I am only doing the task I intended to do. Have a simple background but choose a font type that will clash with the page to make it easier to read. Try to have the same layout on all pages to save time and it's easier. My project is set out with the report (this) at the beginning and after that the web site with the booking system at the end. Each individual page of the web site and booking system has the HTML code after it in order not to get confused. Applications An application is an item of software that is used to perform a specific function. Examples of these are database creation, management, spreadsheet creation and management or word processing. When creating my web-based system I needed to find out what the best software

  • Word count: 2882
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

TiVo is a type of DVR that allows user to capture television programs and record them to internal hard disk for later viewing. The TiVo basically functions just like video cassette recorders or VCR

TiVo is a type of DVR that allows user to capture television programs and record them to internal hard disk for later viewing. The TiVo basically functions just like video cassette recorders or VCR but with more sophisticated software and hardware to record programs. In addition, live programs can be paused or rewound to repeat a sequence and unlike tape based recorders, a program that is on the process of being recorded can be viewed from the beginning. Advantages: * Convenience - gives total control of what you want to watch and when. * Set TiVo to record a favorite program for later viewing and can be watched over and over again. * Select favorite programs to record either by time, actors etc.. * TiVo interface is easy to use. * thumbs up/thumbs down button which is basically a user rating system that allow viewers to score television shows. * Ratings are then used to determine the user's preferences to suggest some shows to the user. * Season Passes allow TiVo to record a show each time it is aired regardless of when the show begins. * pause and rewind live TV Disadvantages: * Privacy Concerns-TiVo's capability to collect usage data may intrude into the privacy of its subscribers. * Difficult to understand * Can Tivo afford to provide Ad free viewing experience? Issues with channels and Advertising companies Adoption process: * Awareness - Aware of it but

  • Word count: 419
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

WAN Devices

What Devices Are Needed? Types of Device Switches Switches are very similar to hubs with the exception of containing the ability to read the packets received. This means that the device gets the packets, reads them and only forwards them to the appropriate attached device. Because switches can read the packets instead of just sending them on to all devices, it means they operate at the data link layer, layer 2. Repeaters A repeater is a simple device that boosts the signal so that it can travel much greater distances or avoid "obstacles". They operate at Layer 1 of the OSI Model. Hubs A hub is simply a device that connects parts of LANs together. They are multiport devices and copy the data received from one port onto the other ports. Hubs operate at the physical layer (level 1) as they operate by using simple physical transmissions to send data from one device to the next. Hub's only use bits to send the data and cannot understand anything above bits on the OSI model. Bridges Bridges and Routers are quite similar - they both direct traffic between two devices. A bridge will connect hardware together using hardware assigned MAC addresses. Bridges are a layer two device. This means that bridges cannot determine the type of network that they're running on. Routers Routers, like hubs and switches, connect together multiple networks. Routers use headers and

  • Word count: 1079
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The estate agency will be adding ICT to their company, which will create a network. in network there are lots of assets which gradually builds a network. I am

Q2. Describe the following networking technologies: (P3) TCP/IP addresses Ports Protocols Domain name. TCP/IP addresses- are a network that identifies the addresses of a computer or any devices on a TCP/IP network. The networks that use the protocol to route information contains a message which has a destination reach to. A TCP/IP addresses contains nine numbers but separated by a full stop. Each number can start from 0 and has a limit up to 255. The TCP/IP connects networks that are different sizes and system of different types. The IP address os 32 bit number which uniquely identifies a host such as, a computer, wireless printer and so on. Ports- a port can be found internally and externally within a computer. A port can be described as a socket. Most computers contain more then one serial ports. The serial port allows you to connect devices or USB slots e.g. scanners, printers. Protocols- the protocol will be moving around information, it's a language most computers use over the internet, and also it allows two or more computers to communicate at once. Computers use it to find one another computer and connect which each other. Domain name- the domain name identifies the IP address; domain names are used in URL to identify that specific website. For example can be, www.Facebook.com, the domain name of this is facebook.com. Server jobs File sharing is when have

  • Word count: 1139
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

The digital camera, like the standard film camera, uses a lens to focus the image on a sensor.

Digital Photography Digital photography, which is also called 'digital imaging' since it does not involve the use of film started in the sixties. The original development of the technology is at NASA when they required that exploration spacecraft, unable to return to earth, to be capable of sending back pictures of their voyages. The digital camera, like the standard film camera, uses a lens to focus the image on a sensor. The usual film camera depends on a film to capture the image but the digital relies on a sensor, either CCD or CMOS . As light hits the pixels that make up the sensor, it is converted to a current that is then sent to the 'Analogue to Digital Converter' or A-D converter. When a photo is digitised, its colours are sampled from the sensor and converted to binary format. The smallest image element sampled is called a pixel. The digital image is like a map, where the information about the colour value of a pixel is understood as co-ordinates on the map. When the map is converted back to an image, the pixel goes to its position and colour in relation to the other pixels making up the image and the co-ordinates given to it. From the A-D converter, algorithms are then applied to the data converting it into a digital image. Sometimes, the size of the data generated by an image sensor can be very large. The larger the number of pixels making up the picture,

  • Word count: 1140
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Open Source Software and its benefits for a country like Nepal.

Open Software: Lottery for Nepalese ?Arzun Bastola Class:10 I was on a seminar few months back when I used Open Software for the first time. I had heard about the Open Software before though I hadn't used. This day really was a good day for me. Had I not attended the seminar, I would just go on using the pirated Operating System. When I first knew that Linux was one of the most powerful operating system, which came complete free and an Open Source then few of my friends decided to do everything in Open Software which could be photos designing to website development. It was tough in beginning as there were no place where we could actually learn Linux. We were guided by Sagar Chhetri and Hempal Shrestha, who are working as FOSS experts in Nepal. With their help we were able to use the Linux in an important way. That is how I got involved into it. In the seminar within, I was conned about the importance of Open Software to poor people like we Nepalese. I then knew that it was a kind of lottery like to us because we shouldn't have to pay even a single coin for the softwares which were so designed that they could be used to do any kind of works as the closed softwares like Windows and others do. Open Software have very big benefit especially in a country like Nepal. The first benefit is that, Nepal still being very little exposed to the IT field compared to the western world,

  • Ranking:
  • Word count: 1071
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Generations of programming languages.

GENERATIONS OF PROGRAMMING LANUAGES Machine Language First Language Machine code is binary 0's and 1's used in a computers memory. It executes directly without translation it was the only programming language for the first computers using machine language is time consuming, error prone and laborious resulting in few programmers using it today. Assembly Code Second Generation In the 1950's assembly code using mnemonics and denary numbers was introduced an assembler is a program used to translate assembly language programs into machine code before it can be executed. Assembly code is still used for applications where timing or storage space is critical. Why use assembly code? * To execute as fast as possible * T o occupy as little space as possible Assembly code is used for parts of an operating system, device drivers and programs in embedded systems. Imperative High Level Language High-level languages are independent of computer architecture and are written in English statements. One high levels language statement is translated into several machine code instructions. Imperative languages consist of a number of instructions in sequence, which the computer follows. These include Language Purpose Algol ALGOrithmic Language Mathematical / Scientific Fortran FORmula TRANslation Mathematical / Scientific COBOL Common Business Orientated Language

  • Word count: 423
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Memory Managment Operating Systems

Ricki Lambert Operating systems Assignment 2 Memory Management Introduction Memory management is a control of the operating system. Memory management is the most vital part of keeping computers resources in order. Without this kind of management the computer would experience severe problems when multiple threads are to be run, and when processes are completed and memory is to be regained. The management system is therefore capable of allocating and de-allocating memory when needed by the system. When a system has too little memory it will become unstable and therefore almost unusable. The memory managing sector of the operating system will also allocate an orderly fashion for the executable files to be dealt with, this then allows for the memory management system to determine what is in the memory for optimum performance and C.P.U utilization. It must be constantly active searching through its system and deciding what parts are being used by whom and what threads and applications need to be moved in and out of the system. When the memory becomes to full there must be an application or process to free some of it. A list can be seen below of the main purposes of the memory management sector. . Relocation of memory 2. Allocation of memory 3. Protection of memory 4. Sharing of memory 5. Logical organisation of memory 6. Physical organisation of memory Address

  • Ranking:
  • Word count: 1301
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay