Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
Data Input, Output, Storage Devices and Determining the Speed of a Computer
This paper has made use of the different input and output methods for computers as well as studied the differences between primary and secondary storage. It also checks for the roles of different computer parts in the overall working of the computer.
In computer terminology, data is something that is unprocessed and raw, which does not have a series of clusters within it. On the other hand, information is more detailed and the better form than that of data. It is processed data, whereby it is meaningful data that can be used for manipulation in the computer networks as well as in the computer itself. This paper discusses the different types of methods of data input and output as well as storage devices and also aims at determining the speed of a particular computer.
Data is very significant to the operations of a computer and its architecture not only in the long run but also in the minutest of details required in the running of a machine. This data further progresses in the form of information when meaning and explanation is attached to it. There are certain data input methods, which could be best for the following devices:
Printed Questionnaires: For printed questionnaires, devices like Optical Character Recognition (OCR) and OMR can be used which can detect whether or not a particular area of the questionnaire is selected, unselected or left vacant. This holds true for Multiple Choice Questions which have a set of answers and it is pretty difficult to tally the exact answers that are filled in by the respondent. So for this purpose, OCR and at times, even OMR can be used and this ensures 100% validity of the data that is being checked through the computerized devices.
Telephone Survey: For the survey requiring the use of a telephone, first of all the need is to find the right kind of people who have the facility of using telephones as well as the criterion for fitting in the category of being chosen in it. People could be asked a number of questions, which could be recorded in a recording machine that is fixed with the central telephone device at the host node. Whatever the respondents answer can be recorded at this end without any glitches or errors, however there is a certain degree of error possibility if the phone line is faulty at either end or the respondent does not agree to comply with the survey at all.
Bank Checks: Bank checks can be input by using a particular type of computerized pen whose ink has the ability to remain there in the paper for as long as possible and it cannot be rubbed or diminished. For the same purpose, two signatures are taken of the person whose bank account it is to ensure that there is no forgery being committed. The bank checks can be further checked by passing them through certain optical machines present at the cashier's desk which not only find out whether the check is original or not but also ascertain the signature of the bank account holder.
Retail tags: Retail tags can be checked by optical scanners present at the counters whereby they read the 14-digit information embedded on the small paper alongside the retail product. This 14-digit code is the universally accepted figure for retail tags fitted on products. The checking is basically undertaken courtesy through bar code readers. These bar code readers also document the transactions that have taken place within a stipulated period of time as well as check for the authenticity of the retail tag on the product itself as well.
Long Documents: Long and profiled documents can be studied in the light of computerized search engines or by searching for a particular phrase and at times, even words and quotations. Take the case of Microsoft Word, where pressing Control-F brings to the screen the command of "finding" a particular word in the file of a long document which would not only save time of the reader but would also provide him easy access to the specific heading or word he or she is willing to find information about. [Author Unknown, 2004]
Methods of Output
It is true that convenience and quality of output hold ground for the success of a particular business as well as the machine through which it is being conducted. There are a number of output methods, which have to be taken into consideration. The methods of output for the following devices are:
Hand held computer: A hand held computer can bring out its information or colored pictures through connection to a nearby port of a printer. This is done because the screen of the hand held computer is not that big and one has problems finding out the exact information embedded in the picture or for that matter if he or she wants to view the text or picture in a big version. There are resolutions given in the hand held computer, which can manipulate with the final hard copy that will come out through the printer.
Color Photograph: A color photography could be best viewed on either a large flat screen monitor or perhaps if the desire is to store it for future documentation purposes, then it could be taken out a printer. It is important that the printer has an original color cartridge before the printing process has to be initiated. The pixels chosen for the photograph must be very small so as to ensure the clear visibility of the picture on the paper (hard copy).
Resume: A resume or a curriculum vitae can best be seen whilst it being printed on a paper. Its output is best possibly viewed on paper where the employer can easily see and understand for him or herself the shortcomings as well as the strengths of the to-be employee in detail.
Memorandum: A memorandum is a form of communication between two people either at different levels of management or at times, even at the same management positions. This requires that they send memos to each other for seeking approval of a particular draft or anything attached with the recommendations of other things in the company. Memos can best be output either through a printer in the form of a hard copy or even still, viewing them on the screen (computer monitor).
Statistical & Company Annual Reports: Both can easily be seen whilst them being stored and documented in big files after they have been printed or stored in virtual hard disks present in the corporate offices, that can be shared by all the offices easily and swiftly. [Tyson, 2004]
Primary and Secondary Storage
Primary storage is the RAM, or Random Access Memory, which is there in the computer system only for a short while. It vanishes as soon as one switches off the computer. It provides instant access to the recently visited web pages/sites or files in the computer at a distant location or programs that are not so easily opened time and time again. On the other hand, secondary storage is more permanent and not that easily erased. It is called the hard disk within the computer terminology. Secondary storage is there to stay until and unless the user decides to do away with the data on the hard disk once and for all. It is slower as compared to RAM as it has to go through more stacks in order to open a file or a document, one that RAM can easily open within a few microseconds.
In times of today, floppy disks have given way to more advanced forms of secondary storage devices like the CD-Rs (Removable) and CD-RWs (Read and Write). Floppy disks come in…[continue]
"Methods Of Data Input Output Storage Devices And Determining Speed Of A Computer" (2004, May 19) Retrieved December 9, 2016, from http://www.paperdue.com/essay/methods-of-data-input-output-storage-devices-172143
"Methods Of Data Input Output Storage Devices And Determining Speed Of A Computer" 19 May 2004. Web.9 December. 2016. <http://www.paperdue.com/essay/methods-of-data-input-output-storage-devices-172143>
"Methods Of Data Input Output Storage Devices And Determining Speed Of A Computer", 19 May 2004, Accessed.9 December. 2016, http://www.paperdue.com/essay/methods-of-data-input-output-storage-devices-172143
Accuracy of data input is important. What method of data input would be best for each of the following situations and why: Printed questionnaires - Beyond using a manually-based approach to capture this data and transcribing it onto computer screens, the best possible approach would be code the questionnaire so responses could be read with Optical Character Recognition (OCR) software (Nibler, 1993). Designing an on-screen software application that will allow for those
Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IBM offer clustering technology.
Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts
Growth Aided by Data Warehousing Adaptability of data warehousing to changes Using existing data effectively can lead to growth Uses of data warehouses for Public Service Getting investment through data warehouse Using Data Warehouse for Business Information Ongoing changes in Data Warehousing The Origin of Data Warehousing and its current importance Relationship between new operating system and data warehousing Developing Organizations through Data Warehousing Telephone and Data Warehousing Choose your own partner Data Warehousing for Societal Causes Updating inaccessible data Data warehousing for investors Usefulness
Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. 1.4. Lecture Survey. The predicted solution of the problems related to e-government administration depends on answering the following questions as brainstorming ideas to solve the problem and the features provided by the system
Michael Cooley (1972) has suggested that the drawing office has been downgraded in importance as a result of the finer division of labor in engineering that began in the 1930s. He described how the creative design element had become increasingly separated from the work of executing drawings. The fragmentation of shop floor jobs was, according to Cooley, paralleled by fragmentation of the job of the designer/drafter. Until the 1930s, drafters
Ayers (2000, p. 4) describes a supply chain as "Life cycle processes supporting physical, information, financial, and knowledge flows for moving products and services from suppliers to end-users." A supply chain can be short, as in the case of a cottage industry, or quite long and complex as in the manufacture, distribution, and sales of automobiles. In fact, the automobile supply chain has its origin in the mining of the