Peripherals And Backup Strategies And Devices Essay

PAGES
2
WORDS
701
Cite

¶ … computer hardware that are attached to a computer in order to increase its capabilities. In some cases, peripheral is a term that used to refer to computer devices that are optional in nature instead of those that are usually required by principle. There are various kinds of computer peripherals that not only differ from the way they are connected to the computer i.e. internally or externally but also differ in how they operate and their purpose. There are two most famous and commonly used computer peripherals i.e. mouse and keyboard, which are primarily input devices that are used to give instructions to the computer system. A keyboard is basically described as an input device that is relatively similar to a typewriter and consists of different kinds of keys for data entry to a computer system. In contrast, a mouse is a plastic rodent with at least two buttons and is used to give commands to a computer system. The other computer peripherals include a speaker, printer, external hard disk drive, and a scanner ("What Are Some Popular Computer Peripherals?" n.d.). A printer is an output device that allows a user to take images and/or text from the computer and prints them on a piece...

...

make a hardcopy of it. The external hard disk drive is a storage device that is used as an independent drive for secure storage of data. The device acts as a backup for large chunks of data or files and is armored to withstand falls and impacts. In the past few years, the costs of external hard disk drives have reduced significantly while the storage capacity has increased beyond one terabyte. Speakers are output devices are considered as must-have computer peripherals because of their sound capabilities. These devices are primarily used for giving sound when playing a video or audio file, especially because of the increase in the use of computers in playing music.
Backups

Computer data is usually in various forms including movies, documents, pictures, videos, and software log files. Data backup strategies are important because they help in ensuring secure storage of data, especially with the increased vulnerability of hard disk drive. There are various backup strategies and devices that can be used with a personal computer at home or in the workplace to avoid loss of data. The first data backup strategy is the preventative measure of copying all data on…

Sources Used in Documents:

References

Lewis, J. (n.d.). Data Backup Strategies. Retrieved January 31, 2015, from http://smallbusiness.chron.com/data-backup-strategies-26027.html

"What are Some Popular Computer Peripherals?" (n.d.). Wise Geek -- Clear Answer for Common

Questions. Retrieved January 31, 2015, from http://www.wisegeek.com/what-are-some-popular-computer-peripherals.htm


Cite this Document:

"Peripherals And Backup Strategies And Devices" (2015, January 31) Retrieved May 5, 2024, from
https://www.paperdue.com/essay/peripherals-and-backup-strategies-and-devices-2148010

"Peripherals And Backup Strategies And Devices" 31 January 2015. Web.5 May. 2024. <
https://www.paperdue.com/essay/peripherals-and-backup-strategies-and-devices-2148010>

"Peripherals And Backup Strategies And Devices", 31 January 2015, Accessed.5 May. 2024,
https://www.paperdue.com/essay/peripherals-and-backup-strategies-and-devices-2148010

Related Documents

Delphi Study: Influence of Environmental Sustainability Initiatives on Information Systems Table of Contents (first draft) Green IT Current Methods and Solutions Green IT and energy costs Green It and Email Systems Green IT and ICT Green IT and ESS Green IT and TPS Green IT and DSS Green IT and other support systems Green IT and GHG reduction Green IT and the Government Sector Green IT and the Corporate Sector Future Prospects of Green IT in the software industry The paper focuses on how the

Network Design Consultation Design recommended for the client The requirement of the client of the small billing business shall deserve a tailored system for his network design. This compels for network similar for a small office management process. Shall has a variety of the components suited in their places. The network shall facilitate the process of file sharing, internet access, connection to a networked printer, maintain a basic, secure environment and facilitate

Galileo Product Idea Description Most technical innovations in any field have been combinations or amalgams of software and hardware applications that were never meant to be used together. However, they have nevertheless come into existence because someone decided to marry up these unimagined elements in combination with each other. To midwife these projects to full fruition, startup money is needed. As usual, the military is the usual maternity ward for such applications and

Strategic Recommendations for a Reduction of Operating Costs for Burn Care Unit Burn Care Unit is a healthcare organization operating the 40-bed unit. Since its formation, Burn Care Unit business has been profitable with an increase in revenues, however, the organization has faced challenges in recruiting the professional nurses, which forces them to adopt the Baylor plan. The plan is an overtime policy that adopts 36 hours pay for nurses who

Air Traffic
PAGES 102 WORDS 28110

Air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads and

Of these elements, they found anxiety sensitivity to be directly linked to lower levels of educational advancement. Anxiety sensitivity mainly comprises symptoms of anxiety leading to fear due to a certain belief that anxiety has dangerous somatic, psychological, or social penalties. In one study scholars found that the basic forms of fears were the playing field for a broad spectrum of fear-stimuli and they found that these basic forms of