Verified Document

What Are The Purposes Of Computer Hardware And Software  Case Study

Network Administration Computer hardware and software

Computer software refers to a collection of procedures, computer programs and codes that perform different functions on a computer system. Software systems are often classified into system software, programming software, and application software. Any physical device used in or with a computer is referred to as computer hardware. A computer display monitor, a CD-ROM and a printer are all examples of hardware.

Functions of computer hardware

The following are the functions of different computer hardware:

Internal system unit components

A processer, also known as the central processing unit (CPU), enables the operating system and operating software run on a system, by executing a set of instructions (Clements, 2006). A motherboard holds the processor and links internal components, such as the random access memory (RAM), together using communication buses. Basic input/output system (BIOS) is responsible for linking computer software and hardware (Clements, 2006). It ensures hardware components perform their functions and turns off processes in the correct way. A power supply unit (PSU) is used to power the components in a computer system while the universal serial bus (USB) and serial enable it to communicate with external devices.

Internal memory components

Internal memory components include the RAM, ROM and cache. Data is written and...

Parts of this document are hidden

View Full Document
svg-one

Cache memory is RAM that can be accessed quicker than RAM and carries out instructions more swiftly.
Peripherals

Output devices, such as monitors and printers, portray signals to the end user from the operating system (Clements, 2006). Coaxial and fiber optic cables are used to connect the computer to various networks. Backing storage devices are also peripherals used to back up the information stored in a computer to prevent loss of valuable information.

Functions of computer software

Application software

This type of software is used to perform functions beyond the performance of the computer by itself. It may be a single program or a collection of programs that work together to accomplish different tasks (Berger, 2005). Image viewers provide entertainment to the user, and others such as Microsoft office may be applied in business or learning environments.

System software

System software provides a platform for running software and operates the computer hardware by integrating, controlling and managing different components (Berger, 2005). Operating systems provide services to other software and device drivers control the devices attached to computers.

Power supply and form factors

Power supply

The power supply unit…

Sources used in this document:
References

Berger, S.A. (2005). Hardware and Computer Organization: The Software Perspective, Volume 1. Burlington: Elsevier, Inc.

Brown, M. (2011). Power Supply Cookbook. Woburn: Butterworth-Heinemann

Clements, A. (2006). Principles of Computer Hardware (4th Ed.). New York, NY: Oxford University Press, Inc.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Hardware -- Feature Comparison
Words: 534 Length: 2 Document Type: Essay

Comparison of Product Suitability The Inspiron Mini 10 (1018) Netbook (http://www.dell.com/us/p/inspiron-mini1018/pd) meets all of my needs for a portable computer as described. However, for full computer functions that include a 40 GB hard-drive, 1.86 Gigahertz microprocessor speed, 512 MB RAM, with Windows XP Pro Business Suite, CDRW and DVD burner, I use an IBM Thinkpad Model-Year 2005 T-43 (http://www.amazon.com/Thinkpad-T43-1-86GHz-Laptop-Notebook/dp/B000979258/ref=sr_1_1?s=electronics&ie=UTF8&qid=1287825031&sr=1-1). The full-feature capabilities of this IBM Thinkpad are equivalent to a basic desktop computer

Computer Hardware Industry
Words: 1389 Length: 5 Document Type: Term Paper

Computer Hardware Industry: Marketing and Advertising Strategies Within this research paper, an overview will be provided of marketing and advertising strategies utilized within the computer hardware industry. For the purposes of accomplishing this aim, the strategies used by Gateway, Dell, and Hewlett Packard will be examined. As each company is analyzed, comparisons and contrasts will be made with strategies used by the competitors. Gateway According to Fikes (2003), Gateway Inc., once famous

Computer Hardware Evolution of the
Words: 1576 Length: 5 Document Type: Term Paper

While there are problems with using two cards at the same time, they can be worked out with study and creativity. In fact, there are ways to use two AGP slots on the same computer, so nothing can be ruled out when it comes to combining cards and slots (Weinand, 2004). In conclusion, graphics cards have evolved from simple chips that displayed nothing more than text into graphic wonders that

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Fundamentals the Pace of
Words: 1767 Length: 6 Document Type: Essay

Subtopic 6: Job management and protection; include a serious discussion of security aspects The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell, 2010). Defining operating systems to have partitioned memory is just the start, as Microsoft learned with their Windows NT platform. Dedicated memory partitions by user account can be hacked and have been (Funell, 2010). The need for greater levels of user

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now