Information Technology A Home Network Essay

PAGES
4
WORDS
1182
Cite

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts that pop up whenever an operation is detected to overlap with another operation and the System Task Manager to monitor the activities and determine the speed and efficiency of processing within the computer. 4. Ergonomics is the science wherein technical fields such as engineering and industrial design are used to develop ideas, devices, and solutions that are suitable to the working conditions of the user. In the field of information technology and computer-mediated jobs, ergonomics is critical because it ensures that the users achieve a certain level of comfort physically that would make computing or computer-related work more manageable and ultimately, more efficient. Recognizing the importance of ergonomics is important for both home and office work, since the primary objective is to increase efficiency in working through ergonomically-designed devices and workplace environment conducive to computer users.

5. Computer-based information systems are intangible structures that are composed of collected, processed, and stored data that came from different sources and transmitted through different hardware and software. Three kinds of information systems are geographic information systems or GIS, data warehousing, and enterprise systems. GIS is the conversion and visualization of physical topographical data, converted into electronic (visual) format for data analysis, coming from different sources and converted from and to different formats. Enterprise systems are integrated systems developed within businesses and companies, which include not only data collection, but also data analysis from the most basic to the most complex level.
6. The different types of memory chips are DRAM, SRAM, EPROM, and PROM. DRAM or dynamic random access memory is memory chips that constantly need refreshing and are dependent on power to preserve its memory. In contrast, SRAM is static; therefore its memory does not need refreshing and memory in it remains even when there's no power. EPROM is an erasable programmable read-only memory, chips wherein memory can be erased either electronically or thru ultraviolet light. PROM, meanwhile, is a memory chip not erasable electronically or thru UV light. Because SRAM is a more reliable and versatile memory chip than DRAM, the former is more preferred to be upgraded during a computer and/or systems upgrade. Upgrades could start from 128MB, but could increase to 256MB and 512MB depending on the user's requirements and budget.

7. The pie chart is best used in showing data in proportions (i.e., part of a whole) and if the categories are less than 10. Examples of usage of the pie chart is when illustrating how a budget was allocated to different departments or activities, or if demonstrating how a 24-hour cycle is consumed normally/regularly by a working individual.

8. Conditional formatting with highlight cells is used when formatting preference is based on the content of the cell. This is useful in business when the user wants to categorize data per row, and highlight the resulting categories through conditional formatting with highlights (e.g., "Passed" highlighted in green, "Failed" in red).

Cite this Document:

"Information Technology A Home Network" (2012, November 26) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/information-technology-a-home-network-76630

"Information Technology A Home Network" 26 November 2012. Web.23 April. 2024. <
https://www.paperdue.com/essay/information-technology-a-home-network-76630>

"Information Technology A Home Network", 26 November 2012, Accessed.23 April. 2024,
https://www.paperdue.com/essay/information-technology-a-home-network-76630

Related Documents

). Such security should also preplan strategic responses to attacks associated with the network (Dawkins et al.). A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a

The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional. In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the

Hence the development of the Open Systems Interconnect (OSI) Model which lead to the development of the Internet and the Ethernet standard and the TCP/IP protocol, both of which nearly the entire Internet runs on today. #9, in what way have phones and computers converged? Why is this convergence occurring? The personal productivity tasks of communication as it relates to the use of telephones and computer systems has long been an

" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used