Explaining Specific Computer Parts Term Paper

¶ … Computer Parts For printed questionnaires, it is perhaps best to scan the document. This would have the advantage of simply translating the information on the questionnaire directly into the computer, where it can be further processes and used. On the other hand, scanning would have the disadvantage that it does not necessarily check that the information in the questionnaire is correct and one still has to ensure manually that all the questions were answered, etc. Additionally, the scanning method may prove a little bit more expensive than other methods.

For the telephone survey, manual data entry seems the obvious choice, since the operator receives the information directly and I can think of no technology that can actually take over data and transfer it from the telephone to the computer.

In the case of bank checks, due to the high level of accuracy that needs to be reached, I would suggest something like an optical...

...

In the case of a hand held computer, adaptable devices such as smaller memory chips are available.
For a color photograph, I would suggest a high resolution printer, because we would tend to emphasize quality in this case. An ink jet printer would probably be preferred.

For a resume or a memorandum a normal laser printer can be used, because we are only interested in the actual information that is presented in these documents rather than in its quality.

For a statistical report, given the fact that we may have a lot of graphs and charts, we may consider using a plotter, that is an output device specially designated for diagrams, etc.

Finally,…

Sources Used in Documents:

Cite this Document:

"Explaining Specific Computer Parts" (2004, October 10) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/explaining-specific-computer-parts-177349

"Explaining Specific Computer Parts" 10 October 2004. Web.16 April. 2024. <
https://www.paperdue.com/essay/explaining-specific-computer-parts-177349>

"Explaining Specific Computer Parts", 10 October 2004, Accessed.16 April. 2024,
https://www.paperdue.com/essay/explaining-specific-computer-parts-177349

Related Documents

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

However, the specific training and education requirements depend very much on a company's specific needs. Previous computer experience is also of vital importance, as is a diversity of related skills. Employers are currently requiring a larger base of diverse skills around the focus of technical expertise. Elements such as interpersonal skills and creativity may be combined with the technical requirements of the job, for example (Brock, Pers. Comm.). The greatest

computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Computer Contracting Contracting Opportunities for a Computer Component Manufacturer: Trends in Federal Spending The pace of technological development is now faster than it ever has been at any other time in human history, and this pace has been steadily increasing for several decades. The emergence of the computer in the first half of the twentieth century could not have foretold the power and mobility that these devices would provide a few short