What Are The Purposes Of Computer Hardware And Software  Case Study

PAGES
2
WORDS
669
Cite

Network Administration Computer hardware and software

Computer software refers to a collection of procedures, computer programs and codes that perform different functions on a computer system. Software systems are often classified into system software, programming software, and application software. Any physical device used in or with a computer is referred to as computer hardware. A computer display monitor, a CD-ROM and a printer are all examples of hardware.

Functions of computer hardware

The following are the functions of different computer hardware:

Internal system unit components

A processer, also known as the central processing unit (CPU), enables the operating system and operating software run on a system, by executing a set of instructions (Clements, 2006). A motherboard holds the processor and links internal components, such as the random access memory (RAM), together using communication buses. Basic input/output system (BIOS) is responsible for linking computer software and hardware (Clements, 2006). It ensures hardware components perform their functions and turns off processes in the correct way. A power supply unit (PSU) is used to power the components in a computer system while the universal serial bus (USB) and serial enable it to communicate with external devices.

Internal memory components

Internal memory components include the RAM, ROM and cache. Data is written and...

...

Cache memory is RAM that can be accessed quicker than RAM and carries out instructions more swiftly.
Peripherals

Output devices, such as monitors and printers, portray signals to the end user from the operating system (Clements, 2006). Coaxial and fiber optic cables are used to connect the computer to various networks. Backing storage devices are also peripherals used to back up the information stored in a computer to prevent loss of valuable information.

Functions of computer software

Application software

This type of software is used to perform functions beyond the performance of the computer by itself. It may be a single program or a collection of programs that work together to accomplish different tasks (Berger, 2005). Image viewers provide entertainment to the user, and others such as Microsoft office may be applied in business or learning environments.

System software

System software provides a platform for running software and operates the computer hardware by integrating, controlling and managing different components (Berger, 2005). Operating systems provide services to other software and device drivers control the devices attached to computers.

Power supply and form factors

Power supply

The power supply unit…

Sources Used in Documents:

References

Berger, S.A. (2005). Hardware and Computer Organization: The Software Perspective, Volume 1. Burlington: Elsevier, Inc.

Brown, M. (2011). Power Supply Cookbook. Woburn: Butterworth-Heinemann

Clements, A. (2006). Principles of Computer Hardware (4th Ed.). New York, NY: Oxford University Press, Inc.


Cite this Document:

"What Are The Purposes Of Computer Hardware And Software " (2015, January 09) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/what-are-the-purposes-of-computer-hardware-2148386

"What Are The Purposes Of Computer Hardware And Software " 09 January 2015. Web.26 April. 2024. <
https://www.paperdue.com/essay/what-are-the-purposes-of-computer-hardware-2148386>

"What Are The Purposes Of Computer Hardware And Software ", 09 January 2015, Accessed.26 April. 2024,
https://www.paperdue.com/essay/what-are-the-purposes-of-computer-hardware-2148386

Related Documents

Comparison of Product Suitability The Inspiron Mini 10 (1018) Netbook (http://www.dell.com/us/p/inspiron-mini1018/pd) meets all of my needs for a portable computer as described. However, for full computer functions that include a 40 GB hard-drive, 1.86 Gigahertz microprocessor speed, 512 MB RAM, with Windows XP Pro Business Suite, CDRW and DVD burner, I use an IBM Thinkpad Model-Year 2005 T-43 (http://www.amazon.com/Thinkpad-T43-1-86GHz-Laptop-Notebook/dp/B000979258/ref=sr_1_1?s=electronics&ie=UTF8&qid=1287825031&sr=1-1). The full-feature capabilities of this IBM Thinkpad are equivalent to a basic desktop computer

Computer Hardware Industry
PAGES 5 WORDS 1389

Computer Hardware Industry: Marketing and Advertising Strategies Within this research paper, an overview will be provided of marketing and advertising strategies utilized within the computer hardware industry. For the purposes of accomplishing this aim, the strategies used by Gateway, Dell, and Hewlett Packard will be examined. As each company is analyzed, comparisons and contrasts will be made with strategies used by the competitors. Gateway According to Fikes (2003), Gateway Inc., once famous

While there are problems with using two cards at the same time, they can be worked out with study and creativity. In fact, there are ways to use two AGP slots on the same computer, so nothing can be ruled out when it comes to combining cards and slots (Weinand, 2004). In conclusion, graphics cards have evolved from simple chips that displayed nothing more than text into graphic wonders that

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Subtopic 6: Job management and protection; include a serious discussion of security aspects The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell, 2010). Defining operating systems to have partitioned memory is just the start, as Microsoft learned with their Windows NT platform. Dedicated memory partitions by user account can be hacked and have been (Funell, 2010). The need for greater levels of user