Premium Essay

Compare and Contrast Pcs and Mainframes

In:

Submitted By lhead3
Words 483
Pages 2
Compare and Contrast PC's and Mainframes
Lowell J. Head
POS/355
July 16, 2012
Wendy Lamont

Compare and Contrast PC's and Mainframes
Introduction
Personal Computers (PC’s) and Mainframes have come a long way since their starts many years ago. The PC’s roots began with the mainframe. Access to the mainframe was done through a small terminal known as a dumb terminal; the dumb terminal provided no processing, only video and a keyboard. This led to trying to take some of the load from the mainframe and put it at the terminal. Thus, the PC was born. A mainframe computer is a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. A PC is only expected to support a single user at a time and focus all of its processing power towards that user’s needs. There are many types of computers that could be called PC’s: Workstation, tower, desktop, notebook, or tablet.
Compare
The PC and the mainframe are very similar in what hardware is needed to operate. Each has a motherboard, processor, bus, memory, storage, operating system(s), and a display. The PC and the mainframe can both be programmed to manipulate data and it can execute a program and store and retrieve data. They respond to instructions as defined by the operating system.
Contrast
The operating system is one of the main differences between PC’s and mainframes. The mainframe’s operating system is very complex, more so than the PC. The size of the mainframe is probably the most noticeable differences between mainframes and PC’s. Mainframes are the size of small rooms and PC’s will fit on a small desk. The mainframe is designed for multiple users to connect at the same time and provide enough processing power to accommodate these users. Most mainframes will have multiple processors to support these users. Multiple processors are an “option” for the PC.

Similar Documents

Premium Essay

Hee We Go

...Objectives By the end of this lesson, you will be able to:  Describe the functions and advantages of a network.  Describe the evolution of networking models.  Compare and contrast server-based and peer-to-peer networks.  Identify the characteristics of local area networks (LANs).  Identify the functions of a networking operating system, network interface cards and transmission media.  Compare wired and wireless connections.  Identify the advantages of using open standards such as Transmission Control Protocol/Internet Protocol (TCP/IP).  Identify the two types of addressing used on a LAN: MAC addresses and IP addresses.  Describe the structure and allocation of IPv4 addresses.  Describe the structure of IPv6 addresses.  Identify the advantages of using private IP addressing, and describe the process of Network Address Translation (NAT). 1-2 Local Area Networks (LANs) Pre-Assessment Questions 1. In a centralized computing model, what is situated at the center of the network? a. b. c. d. 2. node host mainframe client There is no centralized management of network resources in which type of network? a. b. c. d. 3. A A A A A A A A peer-to-peer network server-based network mainframe network domain-based network What are two characteristics that describe a local area network (LAN)? © 2012 CertPRESS, a division of Certification Partners, LLC — All Rights...

Words: 8056 - Pages: 33

Free Essay

Compare and Contrast Three Forms of Malware

...Abstract Three forms of malware that originally had legitimate applications, but have over time been developed as malicious software are taken into account: ActiveX control, Telnet, and NetBIOS. They are explained first, then the risks user can face if his computer is infected with that malware are given, and the countermeasures which should be taken in order to combat the malware. After that, the compare and contrast of the three forms of malware mentioned above is given. In the end, two recent forms of malware, Flame and FinFisher are explained. ActiveX control What is an ActiveX control? ActiveX is a software component of Microsoft Windows. It is already installed in a computer with Internet Explorer. ActiveX controls are small programs, sometimes called add-ons that are used on the Internet. They can enhance browsing experience by allowing animation or they can help with tasks such as installing security updates at Microsoft Update. Some websites require installing ActiveX controls to see the site or perform certain tasks on it. When these websites are being visited, Internet Explorer asks to install the ActiveX control. The website that provides the ActiveX control should tell the visitor what the control is for. It should also provide relevant details on the web page before or after the warning. Internet Explorer blocks websites from using an ActiveX control if the website tries to use the ActiveX control in a way that might not be safe. What are the risks? ActiveX...

Words: 2385 - Pages: 10

Premium Essay

Enterprise Systems

...into smaller manageable tasks that could be assigned to a group of people who could then be held responsible. * HORIZONTAL SILO: VERTICAL SILO: 2. What is the relationship between organizational functional silos and IS functional silos? ANSWER: The only relationship that exists between organisational function silos and IS function silos is that they both serve to fulfil the needs of a department. * Organizational functional silos are termed as independent unit and the changes that made in these silos are not allowed to be shared between other departments in that organisation. * IS functional silos are much different from that of organisational silos because there is no online sharing of data. 3. Compare and contrast centralized, decentralized, and distributed IT architectures....

Words: 907 - Pages: 4

Free Essay

Good

...Integrity servers that run its SAP ERP and Business Information Warehouse, to the HP iPAQ Pocket PCs used by its retail salesforce. In addition to cost savings, the simplified infrastructure has enabled quick response to business change — most notably when General Mills acquired Pillsbury, a company of near equal size, and integrated it into its infrastructure in just 16 months. General Mills markets 100 of the world’s best-loved food brands, including Betty Crocker, Haagen-Dazs, Pillsbury, Green Giant, Old El Paso, Wheaties and Cheerios. It holds the No.1 or No.2 market position in virtually every category in which it competes. It also relies on a single vendor for its IT systems worldwide: HP. “We think that we’re extremely different in the way that we manage information systems at General Mills,” says Vandy Johnson, senior director of I.S. Operations, who oversees the $12.3 billion - dollar company’s business warehouse, data management, telecom, network, I.S. security, data center, and server and web infrastructure operations. General Mills operates the core of its business — supply chain, product lifecycle management, finance, human resources, business intelligence and data warehouse — on SAP R/3 and an Oracle9i database running on HP-UX11i v2 on Intel® Itanium® 2 processor-based HP Integrity servers. It relies on HP for its Intel-based servers and its desktop, notebook, and handheld PCs running Microsoft Windows. It has standardized on HP ProCurve Networking...

Words: 3508 - Pages: 15

Premium Essay

Intro to Information Technology

...letter, number, or character is a unique combination of 8 bits of 0s and 1s * Computer uses combination of hardware and software to process data into information * Hardware is any part of the computer you can physically touch * Software is set of computer programs * Application- software that runs on top of another * Is all the computer software that causes a computer to perform useful tasks (compare with computer viruses) beyond the running of the computer itself. * System software- is computer software designed to operate and control the computer hardware and to provide a platform for running application software. * Types of Computers * Two basic designs of computers * Portable * Laptop computers * Netbooks * Tablet PCs * Tablet computer * Ultrabooks * Stationary * Desktop computers * Separate case plus peripheral devices * All-in-one computers * Mainframe * Supports many users simultaneously * Supercomputer * Performs complex calculations extremely rapidly * Embedded *...

Words: 1125 - Pages: 5

Premium Essay

Tech Guide

...Tech Guide 1 Hardware TG1.1 Components of a Computer System TG1.2 Evolution of Computer Hardware TG1.3 Types of Computers TG1.4 Microprocessor and Primary Storage TG1.5 Input/Output Devices TG1.1 Components of a Computer System Computer hardware is composed of the following components: central processing unit (CPU), primary storage, secondary storage, input devices, output devices, and communication devices. Communication devices are covered in detail in Tech Guide 4. The input devices accept data and instructions and convert them to a form that the computer can understand. The output devices present data in a form people can understand. The CPU manipulates the data and controls the tasks done by the other components. Primary storage (internal storage that is part of the CPU) temporarily stores data and program instructions during processing. Secondary storage (external storage such as flash drives) stores data and programs that have been saved for future use. Communication devices manage the flow of data from public networks (e.g., Internet, intranets) to the CPU, and from the CPU to networks. A schematic view of a computer system is shown in Figure TG1.1. REPRESENTING DATA, PICTURES, TIME, AND SIZE IN A COMPUTER ASCII. Computers are based on integrated circuits (chips), each of which includes millions of sub-miniature transistors that are interconnected on a small (less than l-inch-square) chip area. Each transistor can be in either an “on” or an “off” position...

Words: 8488 - Pages: 34

Premium Essay

Inf 103 the Future of Cloud Computing

...money you would save just for the commuting alone. Warehouses that make and ship goods for companies could all be tracked by a bar code and becomes accessible wherever there is an internet connection. This is the future of cloud computing. Cloud computing has become another popular term after Web 2.0. However, there are dozens of different definitions for cloud computing and there seems to be no consensus on what a cloud is. On the other hand, cloud computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established grid computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast cloud computing with grid computing from various angles and give insights into the essential characteristics of both. Cloud computing is something that a great many people have spent a good amount of time pondering. We’re seeing a new trend in software deployment and flexibility goal sets, and as a result, the future may be a different one from what we once envisioned. However, the future of cloud computing is not only recent to be pondered by computer scientists. Quite the contrary, the cloud model dates back to the 1960s as far as being a real theory for deployment. Scientists of the 1960s envisioned computing being made available to common people, to revolutionize work, commerce and learning, in a way...

Words: 1735 - Pages: 7

Premium Essay

Operating System Analysis Paper

...Operating System Analysis Paper Team A: , POS/355 August 25, 2012 Demetrius Fluker University of Phoenix Operating System Analysis Paper When ruminating over which operating system for a home, business, or office computer or network of computers, it is vital to evaluate all areas of the different operating systems options. The key system options to compare and contrast when evaluating Microsoft Windows XP, Microsoft Windows Server 2003, and Linux operating systems are to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Moreover, the best fit operating system can be determined depended on the individual’s or organization’s needs. Operating System Requirements Windows XP The system requirements for Windows XP Home Edition and Professional Edition are the same. These requirements are a PC with a 233 megahertz or higher (a 300 megahertz + processor speed is recommended), 64 megabytes (MB) of RAM or higher (128 MB is recommended), 1.5 gigabytes (GB) of available hard drive space, a video adapter and monitor that is Super VGA (800x600) or higher-resolution, CD/DVD-ROM drive, keyboard, and mouse/pointing device. The Windows XP Starter Edition has different system requirements. These are 233MHz processor or better, 256 MB of RAM, Super VGA (800x600) video adapter and monitor, CD/DVD-ROM drive, keyboard, mouse/pointing device, DirectX 9 graphics with 32 MB...

Words: 4101 - Pages: 17

Premium Essay

What This

...Seminar – 7 Chapter 7 Financial Responsibility Centers Financial Result Control System Financial Result Control System results are defined in monetary terms, most commonly in terms of accounting measures such as revenues, costs, profits, and returns. Advantages of Financial Result Control System  Financial objectives are paramount in for-profit firms.  Financial measures provide a “summary” measure of performance by aggregating the effects of a broad range of operating initiatives across a possibly broad range of markets, products, or activities into a single or a few measures.  Most financial measures are relatively precise and objective.  The cost of implementing financial result controls is often small relative to that of other forms of management control. Types of financial responsibility centers Investment centers Investment centers are responsibility centers whose managers are held accountable for the accounting returns on the investment made to generate those returns. Profit centers Profit centers are responsibility centers whose managers are held accountable for profit which is a measure of the difference between the revenues generated and the costs of generating those revenues. The goal for not-for-profit organization is to break even, or perhaps even incur limited losses. However, for-profit entities is normally not considered desirable to generate higher profits than those budgeted. Two limited forms:  When sales-focused entities are made into...

Words: 7136 - Pages: 29

Premium Essay

Computer Literacy

...noter Introduction to Computer The word computer is derived from the Greek work “compute” which means to calculate and it is a device that can perform arithmetic operations and take logical decisions. Computer is an electronic device; used to convert Data into Information, it takes input (data) through input devices process it into CPU, stores it and also displays the result through output devices. A computer is a programmable machine. The two principal characteristics of a computer are; it responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list of instructions (a program). Modern computers are electronic and digital. CPU The actual machinery; wires, transistors, and circuits are called hardware while the instructions and Data are called software. All the general-purpose computers require the following hardware components: Central processing unit (CPU) The “heart” or “Brain” of the computer, the component that actually executes instructions is known as CPU or Central Processing Unit. Memory It is also known as main memory, primary memory or simply RAM (random access memory). It is volatile type of memory. It enables a computer to store data and programs temporarily. Input devices Devices used to input the data and instructions into the computer system. Usually a keyboard and mouse are used as input devices. Output devices Devices used to...

Words: 10903 - Pages: 44

Premium Essay

Logistics Information System

...Chapter Three Logistics Information Systems I. Learning objectives and requirements 1. to know why timely and accurate information is critical for effective logistics systems design and operations 2. to know four levels of SCIS’s functionality including transaction systems, management control, decision analysis, and strategic planning 3. to understand the comprehensive information system integration 4. to know how firms obtain access to supply chain applications 5. to understand the comprehensive information system integration 6. to know the remarkable advances in logistics communication systems capability II. Learning contents Section I. Information System Functionality 1. Main contents 1) Why Timely and Accurate Information is Critical for Effective Logistics Systems Design and Operations. (“Without accurate information the effort involved in the logistical system can be wasted.” in Chapter Two) There are four reasons why timely and accurate information has become more critical for effective logistics systems design and operations:a) Customer perceive information about order status, product availability, delivery schedule, shipment tracking, and invoices as necessary elements of total customer service. Customers demand access to real time information. b) With the goal of reducing total supply chain assets, managers realize that information can be used to reduce inventory and human resource requirements. In particular, requirements planning using the most current information...

Words: 2841 - Pages: 12

Premium Essay

Motiwalla Chapter 2

...Enterprise Systems for Management Instructor’s Manual – Motiwalla & Thompson 1 CHAPTER  2  –  SYSTEMS  INTEGRATION     CHAPTER  OBJECTIVES   • • • • • Understand the impact of organizational structure on information systems Find out about the types of functional silos in organizations Learn about the evolution of information systems technology generations and architectures and their influence on a silo environment Know what systems integration is and why it is important for organizations Understand the role of Enterprise Resource Planning (ERP) systems in systems integration CHAPTER  OUTLINE     I. II. III. IV. V. VI. VII. Opening Case: AIR CARGO’s e-ENTERPRISE SYSTEM Functional Silos a) Horizontal Silos b) Vertical Silos c) Business Process and Silos Evolution of IS in organizations a) IS Architectures b) IS Fictionalizations Systems Integration a) Logical Versus Physical SI b) Steps in Integrating Systems c) Benefits of System Integration d) Limitations of System Integration ERP and Systems Integration a) ERP’s Role in Logical Integration b) ERP’s Role in Physical Integration Implications for Management Case 2-2 Real-World Case: Systems Integration at UPS Corp   CHAPTER  OVERVIEW   This chapter discusses the evolution and importance of Systems Integration and the role of ERP systems in systems integration. The chapter begins with a discussion on information silos. If you...

Words: 2251 - Pages: 10

Premium Essay

Database

...rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2861-2 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com Preface In recent years there have been significant advances in the development of high performance personal computer and networks. There is now an identifiable trend in industry toward downsizing that is replacing expensive mainframe computers with more cost-effective networks of personal computer that achieve the same or even better results. This trend has given rise to the architecture of the Client/Server Computing. The term Client/Server was first used in the 1980s in reference to personal computers on a network. The actual Client/Server model started gaining acceptance in the late 1980s. The term Client/Server is used to describe a computing model for the development of computerized systems. This model is based on the distribution of functions between two types of independent and autonomous entities: Server and Client. A Client is any process that request specific services from server processes. A Server is process that provides requested services for Clients....

Words: 79055 - Pages: 317

Free Essay

It Auditing Ch 3 Powerpoint

...Chapter 3—Security Part I: Auditing Operating Systems and Networks TRUE/FALSE 1. In a computerized environment, the audit trail log must be printed onto paper documents. ANS: F PTS: 1 2. Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling. ANS: F PTS: 1 3. A formal log-on procedure is the operating system’s last line of defense against unauthorized access. ANS: F PTS: 1 4. Computer viruses usually spread throughout the system before being detected. ANS: T PTS: 1 5. A worm is software program that replicates itself in areas of idle memory until the system fails. ANS: T PTS: 1 6. Viruses rarely attach themselves to executable files. ANS: F PTS: 1 10. Operating system controls are of interest to system professionals but should not concern accountants and auditors. ANS: F PTS: 1 11. The most frequent victims of program viruses are microcomputers. ANS: T PTS: 1 13. Operating system integrity is not of concern to accountants because only hardware risks are involved. ANS: F PTS: 1 14. Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs. ANS: T PTS: 1 15. In a telecommunications environment, line errors can be detected by using an echo check. ANS: T PTS: 1 16. Firewalls are special materials used to insulate computer facilities ANS: F PTS: 1 17. The message authentication code...

Words: 7824 - Pages: 32

Premium Essay

Master of Business Administration

...SYSTEM CONCEPTS A system can be simply defined as a group of interrelated or interacting elements forming a unified whole. Many examples of systems can be found in the physical and biological sciences, in modern technology, and in human society. Thus, we can talk of the physical system of the sun and its planets, the biological system of the human body, the technological system of an oil refinery, and the socioeconomic system m of or a business organization. producing outputs in an organized transformation process. Such a interacting components or functions: • Input involves capturing and assembling elements that enter the system to be processed. For example, raw materials, energy, data, and human efforts must be secured and organized for processing. • Processing involves transformation process that convert input into output. Examples are a manufacturing process, the human breathing process, mathematical calculations. w w w .k in system (sometimes called a dynamic system) has three basic in d together toward a common goal by accepting inputs and ia A system is a group of interrelated components working .c o 1 • Output involves transferring elements that have been produced by a transformation process to their ultimate destination. services, For example, finished products, human be and management information must transmitted to their human users. Example A manufacturing system accepts raw materials as input...

Words: 27464 - Pages: 110