Premium Essay

Assignment 1 Chapter 1 Comparing Laptop and Desktop Computers

In:

Submitted By havdaironman
Words 441
Pages 2
Harrison Jackson
Excerpt comparing laptop and desktop computers:
A laptop and desktop computer differ in both size and functionality. A laptop is much smaller and therefore often more convenient to use. A desktop computer is much larger, and tends to last much longer than a laptop before it needs to be repaired or replaced. A laptop is often a self-contained unit, and no additional parts are needed to run it. Users often have to purchase monitors and other accessories to operate a desktop computer. There is little to no difference in the types of software that can be run on each type of computer.
The size is the most noticeable difference between a laptop and desktop computer. A laptop is a single machine with the hard drive, disk drive, monitor, wireless modem, keyboard and mouse contained within it, and it easily folds to be stored in a carrying case. The only additional accessory that is often needed is a power cable with an adapter attached to it. A desktop computer consists of a tower, which is a large rectangular box. The hardware for the computer system is contained in the box. An external monitor, keyboard, mouse and wireless router often need to be attached to a PC in order to fully operate it.
The way in which a laptop and desktop computer system are powered is another difference. A laptop runs on a rechargeable battery. The user often has to plug the laptop into a power source in order to recharge the battery. The laptop can only be used until the battery runs out of power, at which time the owner has to find a power source to plug it in. A desktop computer is operated by a direct power source. Once the owner has found a convenient spot to place the computer, it is plugged into a wall socket and often remains in the same location for the rest of its use.
The way that a laptop and desktop computer are maintained and upgraded is different. If an

Similar Documents

Free Essay

Asdf

...Computer Science Chapter 1: Introduction to Computer Hardware Different Categories of Computer and Computing Devices Tablets The lightest and most portable Touch interface, good for “light” work Laptops/Notebooks Larger display area; adds CD or DVD as well as physical keyboard They are portable; price for performance is not as good as desktop, choice of hardware is limited Specialized Variant Laptops Ultrabooks Thinner, and lighter than laptops Cost is higher than laptop (all hardware being equal) Netbooks Cheaper more portable laptop that is smaller and has a lower quality display and overall less powerful hardware Much less common than tablets today Desktop Computers Everything is separate (monitor, computer, keyboard, etc); this allows you to mix and match and customize your desktop computer, at the cost of increased complexity (some compatibility issues may arise – not everything works together) and decreased portability. Larger ‘footprint’ (More space is required, but this allows for increase expandability) ------------------------------------------------- Reduced costs/more options (compared to laptops) ------------------------------------------------- The purpose of an operating system is to run the computer. The operating system determines the interface of a computer, its configurability, and its security. In general, due to popularity and tweak-ability, the MS-WINDOWS (PC) OS has more viruses than the MAC OS. In general, the MAC OS...

Words: 3669 - Pages: 15

Free Essay

Computer Virtualization

...CHAPTER I Project Title Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network Project Description NEUST-Gabaldon Campus (Formerly Sabani Estate Agricultural College) established their computer laboratory on 2011 which help the students of College and High School for their computer subjects (Office Productivity). Since then, the computer laboratory has its computer administrator in presence of Mr. Jefrain M. Padre, although there was computer network architecture in the campus there were times that the computer had some troubles including the System Unit and its operating system. So, the researchers decided to make a proposal entitled “Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network”. The proposed project used virtualization for it was essentially lets one computer do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Using an Ncomputing M300 (thin-client) series connection of network it was possible for the entire project. Thoroughly, the entire project covered up network of computer using this device (Ncomputing M300 series) to connect through a server in a series type of network. Also, using a server with a high specification it will then try to run at least one programming language that can be used by the Bachelor of Science in Information Technology students of Gabaldon Campus. Project Goals/Objectives Project...

Words: 8853 - Pages: 36

Free Essay

Blah

...NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 ------------------------------------------------- Table of Contents: Table of Contents ………………………………………………………………………………………………………………………………… 2 Table of Contents (cont.) …………………………………………………………………………………………………………………….. 3 Course Syllabus ……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………...

Words: 17866 - Pages: 72

Free Essay

Management

... | | |College of Information Systems & Technology | | |POS/355 Version 9 | | |MU12BIT08 | | |Introduction to Operational Systems | | |Wk 1 June 10 | | |Wk 2 June 17 | | |Wk 3 June 24 | | |Wk 4 July 01 | | |Wk 5 July 08 | Copyright © 2012, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003 by University...

Words: 2247 - Pages: 9

Premium Essay

Trying to Join Site

... Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections, protocols, and services used on the Internet. 8. Describe virtual computing and virtual networking concepts. 9. Describe fundamental cloud computing architectures and services. 10. Apply basic computer security measures by using authentication and access control. 11. Explain the basics...

Words: 12527 - Pages: 51

Premium Essay

Siwes Report on Computer Science

...A REPORT SUBMITTED TO THE SIWES CO-ORDINATOR IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME. 1 DEDICATION I dedicate this report first and foremost to Almighty God who has been there right from the beginning to this very point. Special dedication also to my ever supportive parents, for their relentless support and compassion towards me during the course of my six months SIWES training. To God is the glory. 2 ACKNOWLEDGMENT With a deep sense of appreciation, respect and gratitude, I want to say a big thank you to my parents, brothers, sisters and other relatives and non relative friends for their caring attitude and support from the beginning of my pursuit for B.Sc degree in Information Communication Technology to this point. I also want to express my appreciation to my immediate supervisors, Mr. Ifeanyi Ogochukwu, (ICT Manager, NAMA) and Mrs. Onusi (Information Technology Services Manager (ITSM), NAMA), for their intellectual support during our work together. Not forgetting the other ICT Department Management team of, Mr Femi Opeyori, Mr Ernest Aigbangbe, Mr. Charles Ibe, Mr Emmanuel Adeniran and my other IT colleagues. My sincere appreciation also goes to everyone that has been by me all this while. A Big thanks!!! KOYA TEMITOPE ABAYOMI 3 Table of Contents Title Page Cover Page 1 Dedication 2...

Words: 4261 - Pages: 18

Premium Essay

Mobile Cloud Computing

...CHAPTER 1 : INTRODUCTION Mobile devices allow users to run powerful applications that take advantage of the growing availability of built-in sensing and better data exchange capabilities of mobile devices. As a result, mobile applications seamlessly integrate with real-time data streams and Web 2.0 applications, such as mashups, open collaboration, social networking and mobile commerce. The mobile execution platform is being used for more and more tasks, e.g., for playing games; capturing, editing, annotating and uploading video; handling finances; managing personal health, micro payments, ticket purchase, interacting with ubiquitous computing infrastructures. Even mobile device hardware and mobile networks continue to evolve and to improve, mobile devices will always be resource-poor, less secure, with unstable connectivity, and with less energy since they are powered by battery. Mobile devices can be seen as entry points and interface of cloud online services. Mobile devices (e.g., smartphone, tablet pcs, etc.) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place. Mobile users accumulate rich experience of various services from mobile applications (e.g., iPhone apps, Google apps, etc.), which run on the devices and/or on remote servers via wireless networks. The rapid progress of mobile computing (MC) becomes a powerful trend in the development of IT technology as well as commerce...

Words: 5635 - Pages: 23

Premium Essay

Association Rule Mining

...Notification In the content of this chapter material, you could read section 5.1, 5.2.1 and 5.2.2 to leaning details about the ideas and procedures to mine valid association rules, which are identical to the content Professor Chen introduced to you in class. Note that you do not need to pay more attention to the algorithm or codes of this method. Instead, ideas and related examples are more important for you to understand this method and it is enough to help you complete the assignment. Furthermore, to resolve the problem 2.(c) in EXERCISE 3, you need to read section 5.3.1 to know how to do. This part gives you the concept of multi-level association rule or generalized association rule. 基本阅读:英文资料 5.1,5.2.1 和 5.2.2,这部分内容与老师上课所介 绍的内容一致,不必过分专注于其中的算法和代码部分,更重要的是 理解方法意思,过程及其中的相关例子。扩展阅读:为了解决作业问 题 2 中的(c)小问,你还最好阅读 5.3.1 部分。 Mining Frequent Patterns, Associations, and Correlations Frequent patterns are patterns (such as itemsets, subsequences, or substructures) that appear in a data set frequently. For example, a set of items, such as milk and bread, that appear frequently together in a transaction data set is a frequent itemset. A subsequence, such as buying first a PC, then a digital camera, and then a memory card, if it occurs frequently in a shopping history database, is a (frequent) sequential pattern. A substructure can refer to different structural forms, such as subgraphs, subtrees, or sublattices, which may be combined with itemsets or subsequences. If a substructure...

Words: 26078 - Pages: 105

Premium Essay

Computer Security

... CHAPTer Fundamentals of Network Security 1 C OMPUTER NETWORK SECURITY is very complex. New threats from inside and outside networks appear constantly. Just as constantly, the security community is always developing new products and procedures to defend against threats of the past and unknowns of the future. As companies merge, people lose their jobs, new equipment comes on line, and business tasks change, people do not always do what we expect. Network security configurations that worked well yesterday, might not work quite as well tomorrow. In an ever-changing business climate, whom should you trust? Has your trust been violated? How would you even know? Who is attempting to harm your network this time? Because of these complex issues, you need to understand the essentials of network security. This chapter will introduce you to the basic elements of network security. Once you have a firm grasp of these fundamentals, you will be well equipped to put effective security measures into practice on your organization’s network. While this textbook focuses on general network security, including firewalls and virtual private networks (VPNs), many of the important basics of network security are introduced in this chapter. In Chapters 1–4, network security fundamentals, concepts business challenges, and common threats are introduced. Chapters 2, 7–10, and 13 cover the issues and implementations of firewalls. Chapters 3,...

Words: 16205 - Pages: 65

Premium Essay

Test

...DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY 15 JUNE 2012 TB 11-5800-229-10 LIST OF EFFECTIVE PAGES/WORK PACKAGES NOTE: The portion of text affected by the change is indicated by a vertical bar in the outer margins of the page. Changes to illustrations are indicated by a vertical bar adjacent to the title. Zero (0) in the “Change No.” column indicates an original page or work package. Date of issue for the original manual is: Original: 15 June 2012 TOTAL NUMBER OF VOLUMES IS 1, TOTAL NUMBER OF PAGES FOR FRONT AND REAR MATTER IS 14 AND TOTAL NUMBER OF WORK PACKAGES IS 14, CONSISTING OF THE FOLLOWING: Page/WP No. Front Cover Blank A (1 pg) B Blank i (1 pg) ii Blank iii-iv (2 pgs) Chp 1 Title Page Blank v (1 pg) vi Blank Chp 1 Title Page (1 pg) Blank WP 0001 (8 pgs) Chp 2 Title Page Blank WP 0002 (12 pgs) WP 0003 (20...

Words: 42929 - Pages: 172

Premium Essay

Notes of Unit 1. Chapter 1. Nt1230

...CHAPTER 1 Introduction to Networking Objectives Upon completion of this chapter, you should be able to answer the following questions: ■ What are the requirements for an Internet connection? What are the major components of a personal computer (PC)? What procedures are used to install and troubleshoot network interface cards (NICs) and modems? What basic testing procedures are used to test the Internet connection? What are the features of web browsers and plug-ins? ■ What are the Base 2, Base 10, and Base 16 number systems? How do you perform 8-bit-binary-to-decimal and decimal-to-8-bit-binary conversions? How do you perform simple conversions between decimal, binary, and hexadecimal numbers? How are IP addresses and network masks represented in binary form? How are IP addresses and network masks represented in decimal form? ■ ■ ■ ■ ■ ■ ■ ■ Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary: Internet page 4 page 4 parallel port serial port page 10 page 10 enterprise network Internet service provider (ISP) page 6 personal computers (PCs) page 7 page 8 mouse port page 10 keyboard port page 10 Universal Serial Bus (USB) port expansion slots page 10 page 11 page 10 central processing unit (CPU) random-access memory (RAM) page 9 disk drive page 9 hard disk page 9 network interface card (NIC) video card page 11 input/output devices (I/O) page 9 motherboard memory chip page...

Words: 22727 - Pages: 91

Premium Essay

Test Paper

...g Easier! Making Everythin ™ mputing Cloud Co Learn to: • Recognize the benefits and risks of cloud services • Understand the business impact and the economics of the cloud • Govern and manage your cloud environment • Develop your cloud services strategy Judith Hurwitz Robin Bloor Marcia Kaufman Fern Halper Get More and Do More at Dummies.com ® Start with FREE Cheat Sheets Cheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff! To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/cloudcomputing Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows. Check out our • Videos • Illustrated Articles • Step-by-Step Instructions Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. * Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden Find out “HOW” at Dummies.com *Sweepstakes not currently available in all countries; visit Dummies.com for official rules. Cloud Computing FOR DUMmIES ‰ Cloud Computing FOR DUMmIES ‰ by Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr. Fern Halper Cloud Computing For Dummies® Published by Wiley Publishing...

Words: 96278 - Pages: 386

Free Essay

Msc Thesis

...Count: 14422 For the Attention of Philip Windridge 1|Page Faculty of Computing, Engineering and Sciences Table of Contents Table of Contents 2 Abstract 5 Acknowledgements 6 List of Figures 7 Introduction 8 Chapter 1: Research Methods 9 1.1 Qualitative or Quantitative? 9 1.1.1 Quantitative Research 9 1.1.2 Qualitative Research 10 1.2 Methods to be used 10 1.3 Conclusion 10 Chapter 2: Current Mobile Learning Initiatives 11 2.1 Entrust: Learn Anywhere 11 2.2 Apple in Education 11 2.3 Conclusions 12 Chapter 3: Barriers to E-Learning 14 3.1 Introduction 14 3.2 Attitudes as a barrier to E-Learning and M-Learning 3.3 Financial Barriers to E-Learning and M-Learning 3.4 Conclusions 20 Chapter 4: The Benefits of E-Learning 21 4.1 Distance and Collaborative Learning 21 4.2 Personalised Learning 22 4.3 Increased Interactivity 23 4.4 Additional Resources 23 4.5 Conclusions 24 Chapter 5: Educational Theory 26 5.1 Student Centred Learning (SCL) 26 Chapter 6: Application Development 29 6.1 Initial Web, Database and Application Design 29 6.1.1 Requirements List 29 6.1.2 UML Use Case Diagram and UML Class Diagram 6.1.3 ERD 32 6.1.4 Sitemap and Wireframes 33 6.2 Further Reading 37 6.3 Final Design of the Finished Application 38 6.3.1 Database Design and ERD 38 6.3.2 Web Design / Navigation 39 6.3.3 Monitoring and Moderation 42 6.3.4 Interview with Sue Lee 42 6.3.5 Conclusions 43 Chapter 7: Testing 45 7.1 Testing Evaluation 45 Chapter 8: Survey Questionnaires 46 8.1 Conclusions 46...

Words: 38347 - Pages: 154

Premium Essay

Hrm Human Resources

...Human Resource Management, 12e (Dessler) Chapter 1 Introduction to Human Resource Management 1) The basic functions of the management process include all of the following EXCEPT ________. A) planning B) organizing C) outsourcing D) leading E) staffing Answer: C Explanation: The five basic functions of the management process include planning, organizing, staffing, leading, and controlling. Outsourcing jobs may be an aspect of human resources, but it is not one of the primary management functions. Diff: 1 Page Ref: 4 Chapter: 1 Objective: 1 Skill: Concept 2) Which of the following is the person responsible for accomplishing an organization's goals by planning, organizing, staffing, leading, and controlling personnel? A) manager B) entrepreneur C) representative D) generalist E) marketer Answer: A Explanation: The manager is the person responsible for accomplishing an organization's goals by planning, organizing, staffing, leading, and controlling the efforts of the organization's people. An entrepreneur may manage people or may hire a manager to do so instead, but entrepreneurs are defined as individuals who start their own businesses. Diff: 2 Page Ref: 4 Chapter: 1 Objective: 1 Skill: Concept 3) Which of the following includes five basic functions--planning, organizing, staffing, leading, and controlling? A) job analysis B) strategic management C) employee orientation D) management process E) adaptability screening Answer: D Explanation:...

Words: 11787 - Pages: 48

Premium Essay

Test Bank Marketing Managment by Philip Kotler

...Human Resource Management, 12e (Dessler) Chapter 1 Introduction to Human Resource Management 1) The basic functions of the management process include all of the following EXCEPT ________. A) planning B) organizing C) outsourcing D) leading E) staffing Answer: C Explanation: The five basic functions of the management process include planning, organizing, staffing, leading, and controlling. Outsourcing jobs may be an aspect of human resources, but it is not one of the primary management functions. Diff: 1 Page Ref: 4 Chapter: 1 Objective: 1 Skill: Concept 2) Which of the following is the person responsible for accomplishing an organization's goals by planning, organizing, staffing, leading, and controlling personnel? A) manager B) entrepreneur C) representative D) generalist E) marketer Answer: A Explanation: The manager is the person responsible for accomplishing an organization's goals by planning, organizing, staffing, leading, and controlling the efforts of the organization's people. An entrepreneur may manage people or may hire a manager to do so instead, but entrepreneurs are defined as individuals who start their own businesses. Diff: 2 Page Ref: 4 Chapter: 1 Objective: 1 Skill: Concept 3) Which of the following includes five basic functions--planning, organizing, staffing, leading, and controlling? A) job analysis B) strategic management C) employee orientation D) management process E) adaptability screening Answer: D Explanation:...

Words: 11787 - Pages: 48