Business Computing Computer Hardware and Computer Software

In: Computers and Technology

Submitted By socoche
Words 4963
Pages 20

Declan Brady
Date: 05/02/2013
Tutor: Val Coakley

Table of Contents

Introduction 3
Methodology 4
History of Computers 5
Computer Hardware and Computer Software 9
The Four Main Components of Computer Systems 10
Types of Computer Systems 12
Examples of Computer Input Devices 14
Examples of Computer Output Devices 15
Printers 17
Equipment of the Modern Office 19
Storage Devices 21
Computer Networks – LAN and WAN 22
Systems Software and Application Software……………………………………………24
Conclusion 24
Bibliography 25

This project is been carried out for the Business Computing module for the Computer and Network Technician FETAC Level 5 Certificate course. In completing this project I hope to acquire a greater understanding of computers and the technology that is commonly used with them in the modern workplace. The carrying out of this project itself will also hopefully leave me better equipped with the skills to carry out projects in the workplace if I am required to do so in the future.
For this project I will use the internet to research for the information that this report requires. Once I feel confident I have enough sources for the topics that need to be covered I will start choosing relevant information from these websites and use them in my report where needed. If needed the information taken from websites will be rephrased so that the content is fully relevant to the project.
For this report I will use various Internet search engines to find my information. For browsing websites I will use Google Chrome and its syncing bookmarks feature. For typing up the report I will use Microsoft Word. For any image editing I will use Adobe Photoshop CS 6.
By the end of this report I hope to have a greater knowledge of how to use Internet search engines for carrying out research. I also hope…...

Similar Documents

The Basics of Computer Hardware

.... Much research should be done before purchasing one. Random Access Memory The next piece of hardware is the RAM. The RAM comes in the form of rectangular plates that slide into the motherboard. There are many different sizes and types of RAM that include DDR2, DDR3, SRAM, and DRAM memory. The difference between DDR2 and DDR3 is the speed at which the memory runs at. DDR3 runs faster than DDR2 and is also a more recent technology. SRAM and DRAM are also two different types of memory. SRAM is short for static RAM and DRAM is short for dynamic RAM, Static RAM is used primarily in the CPU as L1 and L2 cache storage. Dynamic RAM is the memory that is plugged into the motherboard in the form of RAM sticks. Many mother boards will have slots where you can put RAM sticks; many times there are only 2 slots. As computers become more advanced, mother boards may have 4, 6, or even 8 slots for RAM. These additional memory sticks allow for much more computing power and keep computers running at amazing speeds. Although computers these days can have many gigabytes of RAM, the frames per second while playing video games can sag if there is no graphics processing unit. Video Cards When thinking about a video card there are a few things to consider, first of which is what you will be using your computer for. If the computer is for an office user, maybe a video card is not mandatory but for a heavy gamer or one that is going to be using video editing or graphic intensive software it is a...

Words: 1905 - Pages: 8

Computer Hardware and Software

...Identify hardware and software needed to secure your choice of networks against all electronic threats. Networking hardware is hardware that is used to help work stations connect to a server. Although there are many different kinds of hardware like bridges, network cards the networking hardware that I have chosen to use in within my company’s network are routers, firewalls and switches. Using both routers and firewalls will help protect not only wireless networks but also those networks that use Ethernet cabling. I chose this hardware because I felt that it’s the best hardware to use when keeping my company’s network safe. The software that I have chosen to use is McAfee Anti-virus security software. This software along with the firewall will keep my company’s network safe and secure. Routers along with firewalls are the top network security hardware needed when it comes to keeping a network almost if not all totally secure. The firewall blocks out any unwanted activity as well block hackers from possibly hacking into our networks and stealing important information that pertains to our company and its customers. Along with the router and firewall networking software also plays a major part. The software is what the firewall uses to create its security barrier over the network. McAfee is one of the top manufacturers when it comes to network security. This software enables the use of not only the internet’s firewall but also the ability to detect viruses, anti-spyware...

Words: 1488 - Pages: 6

Hardware Low End Computer

...Hardware 12/27/12 Scenario 1 Scenario 1 Low End Workstation Have you ever built a low end workstation for a business? Have you ever wanted to know how to build a computer? Have you ever wondered how to make a computer on your own with step by step directions? To build a low end workstation for a business or server you would have to have the proper motherboard, computer case, RAM, power supply, hard drive, CPU, and a DVD disk drive. When you are looking to build a computer you need to make sure that all of the parts are compatible and will fit in your tower. I would first look for a motherboard and computer case. I went with a biostar G41D3 motherboard. It is a micro ATX so you will have to make all of your components will fit onto it. You will have to pick a tower that will fit the micro ATX motherboard. I chose the cooler master elite mid tower case. I chose this case because it will have more air flow since it will be a server so it will probably be running more frequently than a regular computer. I then chose a hard drive. To choose a hard drive you have to know what kind it is. Usually the motherboard will come with a list of compatible hardware. The motherboard I chose is compatible with a SATA hard drive.I chose an intel dual processor because it does not need to perform a lot of tasks at once and it goes with the motherboard. You can find out that the motherboard and the CPU fit together by looking at the specifications of the motherboard. I chose a Toshiba 1...

Words: 1242 - Pages: 5


...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer...

Words: 47755 - Pages: 192

Computer Hardware Fundamentals

...I’m not sure if this means I am a bad person, but the first thing I thought of in regards to disposing of old computers, was making sure all of your personal data was wiped, not about recycling. I think one of the most important things you can do when getting ready to dispose of a computer is to make sure you properly delete all personal information that may be left over on your hard drive. People have computers that “die” or are not able to work anymore, so they might think just throwing them away is safe. But someone who has even a little knowledge about computers can easily open up your laptop or desktop and take out your hard drive. Hooked up to another computer, it would be very easy for them to scan it for personal information. t’s odd to think about replacing a motherboard, because I have actually considered this on personal computers I have owned in the past. But when I talk with some friends who are not as comfortable with changing out hardware, they often times feel so lost because they are not really sure what to look for when purchasing components, such as a motherboard. I think the first thing you need to decide on when shopping for a motherboard, is what is it going to be used for? Are you using your computer for just checking emails and Facebook? Or will you be doing some heavy processing, such as gaming or video editing? I would assume that someone who is actually shopping for a motherboard is doing...

Words: 3676 - Pages: 15

Introduction to Computer and Network Hardware:

...Best Device for Your Needs Introduction to Computer and Network Hardware: ITCO103 - 1401A – 01 IP 1 Best Device for Your Needs Many people are updating their smartphones, laptops and desktops. There are so many options to choose from brand, size and performance. This paper will discuss and compare some of today’s best bargain laptops and computers that will also offer some of today’s most updated software and features. I will also discuss two of the most popular smartphones comparing and contrasting each devices features. While shopping on the internet for the best computer system I had hundreds of choices. I decided to narrow my choices down by picking a device that had all the features I needed in a computer system, but had a reasonable price tag for a full time worker and a part time student budget. The best option for me is the Dell Inspiron 660, and the Canon PIXMA MG2220 all-n-one printer it has all the features and needs that I would need in a personal home desktop system. The price point for this desktop is around $529.00. This device can be purchased at Wal-Mart, Best Buy, and Hhgreeg making it accessible to most for in store purchase. This desktop is also available for purchase online as well from the dell website directly for the price listed above. The system software consists of OS Provided Microsoft Windows 7 Home Premium 64-bit Edition. The system setup...

Words: 1468 - Pages: 6

Computer Hardware and Software

...LETTER OF TRANSMITTAL Date: November 29, 2012 To, Muhammad Shahedur Rahman Lecturer School of Business Studies, UU Subject: Submission of Term Paper. Dear Sir, We are highly delighted to submit our Term Paper in complete form. This assignment is an integrated part of our BBA (CSE) program. To prepare this report we tried our level best to accumulate relevant information from all authentic sources. It will be highly hearten able if you are kind to receive this Term Paper. For the completion of this report we tried hard & soul to follow the guidelines given by you. We are very much thankful that you have given us the opportunity to prepare this report under your supervision and hope that this report will meet the standards of your verdict. Sincerely yours, (Syed Shohan Shah) On the behalf of the group EXECUTIVE SUMMARY In this modern age computer is a very essential in our everyday life. It helps our every work. Without computer we can not live without a single day. It has many parts like hardware which are touchable and software which are untouchable. Computer users may use a scoring system of evaluation when there are several competing proposals for a hardware or software acquisition. They give each evaluation factor a certain number of maximum possible points. Then they assign each competing proposal points for each factor, depending on how well it meets the specifications of the computer user...

Words: 5715 - Pages: 23

Computer Hardware

.... First, spreadsheets can have data in a cell, but a cell is more than just a row-column-intersection. Depending on your spreadsheet software, a cell might also contain formulas and formatting, which database tables cannot have (currently). Secondly, spreadsheet cells are often dependent on the data in other cells. In databases, "cells" are independent, except that columns are logically related (hopefully; together a row of columns describe an entity), and, other than primary key and foreign key constraints, each row in a table is independent from one another. 5. How do I import a text file of data into a database? --Well, you can't do it must use a utility, such as Oracle's SQL*Loader, or write a program to load the data into the database. A program to do this would simply go through each record of a text file, break it up into columns, and do an Insert into the database. 6. What web sites and computer books would you recommend for more information about SQL and databases? --First, look at the sites at the bottom of this page. I would especially suggest the following: DB Ingredients (more theorical topics), DBMS Lab/Links (comprehensive academic DBMS link listing), Tutorial Page (listing of other tutorials), and miniSQL (more information about the best known free DBMS). Also, if you wish to practice SQL on an interactive site (using Java technologies), I highly recommend Frank Torres' ( site at and its new sequel (so to...

Words: 11641 - Pages: 47

Computer Hardware Components

...Discussion: Computer Hardware Components There where several different articles that I found that talked extensively about different computer hardware components. The one component that I found that was interesting and that I never know how many different computer components go into it is graphics cards. Graphics cards use every part of a computer to function correctly and they are built right into the card its self. They have their own RAM, some have their own power supply and they even have their own type of CPU that is called a graphics processing unit or GPU. The author, Jeff Tyson, went into detail on how the graphics card takes information from the CPU and makes it into a picture on your monitor. Tyson (2001) brock it down into lemans terms by saying: Think of a computer as a company with its own art department. When people in the company want a piece of artwork, they send a request to the art department. The art department decides how to create the image and then puts it on paper. The end result is that someone's idea becomes an actual, viewable picture. (P.1) I think it is just amazing on how the simple little card can take information and know how to put it on the monitor as a picture. What is even more amazing is how it works with gaming and is able to make these calculations that fast without any issues, that’s if you have the card that can handle the game. Most standard motherboards come with some type of graphics card but if you want to do more then......

Words: 355 - Pages: 2

Computer Hardware Quiz

...Quiz 1 100% 1. The new drive interface standard for connecting drives in a system is the _______standard...which allows for more than 4 drive installed in a system at a time and is the standard found in newer motherboards today. A) Parallel ATA B) Firewire C) EIDE Standard D) Serial ATA E) USB 2. Which of the following are versions of Windows XP? A) Windows XP Home Edition B) Windows XP Professional C) Windows XP Media Center Edition D) Windows XP Tablet PC Edition E) Windows XP Professional x64 Edition F) All are versions of XP...although some are less significant. 3. The largest and more important circuit board in the computer is the _____________. A) Daughter Board B) Key Board C) Motherboard D) Random Access Memory (RAM) E) PCI Network Card 4. Currently, approximately _____ of personal computers sold today are Macintosh computers. A) Less than 10% B) 10% C) over 40% D) 25% 5. Primary storage is stored on a devices called __________, which is lost when the computer is shutdown. An example of secondary storage is a ___________, which is permanent storage and not lost when the computer is shutdown. A) Hard Drives, RAM Stick B) DVDs, Hard Drive C) Flash Drives, RAM Stick D) Hard Drives, CD E) RAM, Hard Drive 6. What two sources provide device drivers for hardware devices for an operating system? A) Operating System & B) Kernel & Registry C) Operating system & Manufacturers of Hardware D...

Words: 426 - Pages: 2

Importance of Securing Data and Software More Than Computer Hardware in an Organization

...IMPORTANCE OF SECURING DATA AND SOFTWARE MORE THAN COMPUTER HARDWARE IN AN ORGANIZATION BY DHUMISAN CHISI SUBMITTED TO MR MWEKHELA IN PARTIAL FULFILLMENT FOR THE COURSE FUNDAMENTALS OF INFORMATION SYSTEMS COURSE CODE CCC1073 THE MALAWI ASSEMBLIES OF GOD UNIVERSITY 23TH MARCH 2015 Information systems have long been at some risk from malicious actions or unplanned user errors and from natural and man-made disasters. In recent years, systems have become more at risk to these threats because computers have become more organized and, thus, more interdependent and accessible to a larger number of individuals. In addition, the number of individuals with computer skills is increasing, and intrusion, or “hacking,” techniques are becoming more widely known via the Internet and other media. In large organizations computers are kept in large scales and also store a lot of important data and information plus maybe softwares of the at most important. These softwares and information require to be kept safe and protected. It is the sole purpose of this paper to explain the reasons why it is important to secure the organizations data/information and computer softwares of an organization. Some of the information used in business organization requires special protection for confidentiality (to ensure that only those who need access to that information to do their jobs actually have access to it). Some of the information used in business organizations need...

Words: 782 - Pages: 4

Software Engineering for Computer Games

... to the expenditure on the department of defense in the United States of America. Moreover, the game industry is very innovative because the software and even the hardware developments are applied to the game even before its being incorporated and adopted some important scientific domain. Games elaborately appear to be attracting many people globally. The development and creation of computer game are very hard that needs software engineers with outstanding skills. Without skills then it becomes very complicated to create computer games at all costs. Computer games require real-time and greater quality performance. The most valued performance aspects are connected to the display frame rate, the response from the processor and the real-time audio playback (Eijck 2012). Creating the computer games programming aspects must be included to ensure development of quality software. The programming involves several codes that are necessary for the running of the game. The design should be flexible because of the large size of programming Page 6 codes that must be run accompanied by several nature of the software (Flynt 2005). The documentation and maintenance of the developed software need to be simple in order to boost understanding among the group that involves in the development of the software with an aim of increasing or promoting the future performance. The software engineers must have technical skills in order to develop a more quality software that is not...

Words: 8674 - Pages: 35

Quickbooks Accounting Software Computer Requirements

...QuickBooks System Requirement I. Operating systems supported Operating systems supported Windows 8, all editions including 64-bit, natively installed (QuickBooks R4 and later required) Windows 7, all editions including 64-bit, natively installed Windows Server 2012 (Small Business Server/Essentials), Windows Small Business Server 2011, Small Business Server 2008 Windows Server 2008 R2, Windows Server 2008, and Windows Server 2003, including 64-bit,natively installed II. Database Servers: Windows: natively installed & Windows 8, Windows 7 (SP1), Windows Server 2008 R2, Windows Server 2008, Windows Server 2008 - Terminal Server Config., Windows Server 2003, Windows Small Business Server 2012, Windows Small Business Server 2011, and Windows Small Business Server 2008 Note: Windows Home Server Edition is not supported. III. Hardware and operating system requirements (client and server) 2.0 GHz processor; 2.4 GHz recommended 2-4 GB RAM recommended for multiple users for QuickBooks Enterprise Display optimized for 1024 x 768 screen resolution or higher with up to 1 Extended monitor All online services and subscription based features (such as Advanced Inventory) require Internet access. Windows: Administrator Rights required for the server computer when hosting Multi User Access Regional Settings are supported when set to English (United States) with keyboard setting to U.S. only Natively installed Disk space requirements: 10 GB of disk space or more...

Words: 454 - Pages: 2


... motherboard has. It generally has 2 or 4. Therefore, assuming a 1 gigabyte DIMM, 2 slots would supply 2 gigs and 4 slots would supply 4 gigs. Disk drive The RAM memory is like the current thoughts or short term memory of a person, the disk drive is the long term memory. It holds a vast amount of data, programs and control software to support computer system and user activity. Current computer storage technology has advanced to the stage that a 100 Gigabyte drive is quite inexpensive. Getting anything less would needlessly limit your ability to store and save information. Disk memory is much slower than RAM memory but it is much cheaper so that it is used to backup and supplement memory operations. Operating System The operating system is the software that contains the logic to control all the computer hardware, software and systems. It provides the capability to interact with the computer and provides access to and control of all the programs. It also defines and maintains a scheme whereby data can be filed on the computer and retrieved when necessary. The most popular operating systems on the PC are Windows XP and Vista with Linux and other variants controlling a minority of computers. The MAC currently uses OS x which is a variant of the UNIX operating system. Input and Output Keyboard The keyboard is the most direct form of human input to the computer. It can be used to generate data and documents, provide information for commands or to initiate operations on......

Words: 2046 - Pages: 9

Copyright Protection for Computer Software

... Under traditional principles of intellectual property protection, copyright law has served as the principal source of legal protection for literary and artistic work, while the patent system and trade secret law have been the primary means for protecting utilitarian works. Computer software as a relatively new recipient of copyright protection, however, defies easy categorisation within the traditional framework of the intellectual property system. 1 With respect to computer software, courts have had to grapple with the vexatious issue of drawing a precise line between copyrightable expression of computer software and the uncopyrightable processes that they implement. The present paper seeks to study some of these themes and the principles enunciated in judicial decisions in clarifying the issue. Computer software as literary work It is a well-established proposition that computer programs2 are copyrightable subject-matter, just like any other literary work.3 Loading a program into computer memory, saving the program or running it without authority may infringe copyright. Making an arrangement or altered version of the program or converting it into or out of one computer language or code into a different computer language or code is also an infringement. It is a well-established proposition that computer programs are copyrightable subject-matter, just like any other literary work. Loading a program into computer memory, saving the program or running it without authority...

Words: 4305 - Pages: 18