Hardware & Software Concepts Essay

572 words - 3 pages

1. Why is a peer-to-peer architecture not desirable in a business environment?
Peer-to-peer architecture is not desired in a business environment because it is difficult or impossible to establish centralized control to restrict inappropriate access and to ensue data integrity.
2. How many instructions can be executed by a single computer’s CPU at a time?
A single CPU can only process one instruction at a time.
3. What are the 4 components of a computer system?
Hardware, input devices, output devices, and software is all components of a computer system.
4. The hierarchical division of a complex system that contains additional subsystems into its 
component part is known as what?
This hierarchical division is known as decomposition.
5. Explain what are bits and bytes within a computer’s memory structure?
Bits and bytes are memory that holds different patterns. Each ...view middle of the document...

What does the CGI (Common Gateway Interface) do within a client server three-tier 
A protocol for making communication between the Web server and the database application possible.

10. Explain the difference between ROM and RAM memory within a computer?
RAM- Random access memory/ the main memory
ROM- Read-only memory
11. Explain the difference between Standards and Protocols.
Standards- are agreements to assure that various system components will work together interchangeably.
Protocols- network interfaces must conform to standard agreements, or messages to be understood by both computers during a message exchange between a pair of computers.

12. How does middleware work in a client/server system?
Both clients and servers send all request and response messages to the middleware. The middleware resolves problems between incompatible message and data formats before forwarding the messages. It also manages system changes, such as the movement of a server application program from one server to another.

13. What is a BUS in computer terminology?
A BUS is a bundle of wires that carry signals and power between different components

14. Historically, what are the two major developments in computer network and communication 
that led to today’s Internet?
Protocols & HTTP
15. Name at least three operating systems.
Windows, Linux, and OS.
16. What function does a NIC (network interface card)?
A expansion board you insert in the computer to access network.
17. Name at least four high-level computer languages.
Java, C#, C++, SQL
18. What high-level computer language was the UNIX operating system developed in?
The high-level computer language was written in C.
19. An internal system within a company using a browser and web technology is called what?
An internal system within a company using a browser and web technology is called intranet.
20. What is the purpose and function of DNS (Domain Name Service)?
To identify the IP address of the Web server to which the request is to be sent.

Other Papers Like Hardware & Software Concepts

Apple Company Essay

1700 words - 7 pages Apple Company Apple incorporation is an American company established in 1971 by Steve jobs and Steve Wozniak. The company’s headquarters are located in Cupertino, California. Apple Incorporation specializes in designing and developing computer hardware and software but has recently diversified into other consumer electronic goods. Apple Incorporation is the second biggest information technology company by revenue with an estimated revenue of

Project: Access Control Proposal Essay

2458 words - 10 pages applications down through the operating system to the hardware. Higher-level mechanisms can be more expressive, but also tend to be more vulnerable to attack, for a variety of reasons ranging from intrinsic complexity to implementer skill levels. Most attacks involve the opportunistic exploitation of bugs; and software that is very large, very widely used, or both (as with operating systems) is particularly likely to have security bugs found and

Automate Inventory System

1331 words - 6 pages depends on the frequency of transactions. A bandwidth of at least 10 Mbps is recommended (small commercial deployment). The database to store the inventory data will use a MySQL database. Since the software and hardware resources of cash registers are not available due to the variation in software and cost, we will be developing an emulated Cash Register client to interface with actual cash registers. The Cash Register client will emulate

Ntc/362 Fundamentals Of Networking Team Paper

3457 words - 14 pages Community Hospital network to identify additional properties and functions. This paper will look at the hardware and software needed to secure the network against electronic threats, will examine the use of the(WAN and (LAN) for the technologies used to implement them, and finally the concepts of data communication networks will be explored. 11 In any organization it is imperative that measures are taken to protect the network

Ibm Casestudy

2802 words - 12 pages billion gained these revenues with proceeds of computer hardware and software. This blogger recognizes the other business model of IMB, which are consulting, hosting and infrastructure services in fields ranging from nanotechnology and mainframe computers. It has the record for most patents by a company, which it has held for 19 straight years. The company is also credited for inventing the ATM, the floppy disk, the hard disk drive, the magnetic

Computer Security

1909 words - 8 pages . Unfortunately, intruders are always discovering new vulnerabilities (informally called “holes”) to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems. When holes are discovered, computer vendors will usually develop patches to address the problem(s). However, it is up to you, the user, to obtain and install the patches, or correctly configure the software


1016 words - 5 pages budget for the project—consider hardware, software, upgrades/replacements, and consulting services.  Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.  Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.  Prepare a 15 to 20-minute PowerPoint assisted presentation on important access

Competency Matrix

1812 words - 8 pages Interpretation of Computer Programs, Concepts Techniques, Models of Computer Programming, Art of Computer Programming, Database systems , by C. J Date, Thinking Forth, Little Schemer blogs Has heard of them but never got the time. Reads tech/programming/software engineering blogs and listens to podcasts regularly. Maintains a link blog with some collection of useful articles and tools that he/she has collected Maintains a blog in which personal insights and thoughts on programming are shared Comments

It Assistant

5796 words - 24 pages document called the system proposal, which is presented to the project sponsor or other decision makers The design phase decides how the system will operate in terms of the hardware, software, and network infrastructure that will be in place; the user interface, forms and reports that will be used; and specific programs, databases, and files that will be needed. The design phase has four steps:- • The design strategy must be developed. This


1121 words - 5 pages overstocked inventory or stock- outs. Customizing some aspects of this software may be needed to meet Kudler’s specific needs. Currently, general vendor performance evaluation on price, delivery and quality, receiving reports, outstanding purchase order reports, sale and forecasting reports are very time-consuming and difficult for Kudler to accurately generate. There are some weaknesses that appear in the accounts payable regarding cash


4462 words - 18 pages the current Network Infrastructure to provide adequate bandwidth requirements? * Security appliances * Hardware ,software and retraining of employees * Maintenance cost ,systems ,support ,hosting ,licenses and upgrades * Determining what their competitors are using * Life Cycle what is the system lifespan * Productivity and operation efficiency * Risk Management As a consulting organization the most cost effective

Related Essays

Management Informationsystem An Overview Essay

5701 words - 23 pages chips. In contrast, software is untouchable. Software exists as ideas, application, concepts, and symbols, but it has no substance. A combination of hardware and software forms a usable computing system. All the elements that go together to make up a PC fall into one of two categories, hardware or software. This section is about hardware, the stuff upon which software runs. One of the definitions of 'hardware' according to Webster's dictionary is

Management Information Systems Essay

254 words - 2 pages of organizations • Impact of information systems on organizations • The Internet – role in the modern business 4. IT infrastructure • Hardware and software platforms 5. Ethical Issues in Information Systems • Ethical & moral issues • Information privacy 6. Securing Information Systems • System vulnerabilities • Technologies and tools for security and control 7. Emerging Trends in MIS • Cloud computing, others. Assessment

Objective C Essay

556 words - 3 pages The Objective-C environment, a growing collection of tools and reusable components (Software-ICs) for large-scale production system-building is discussed. Its goal is to make it possible for its users to build software systems in the way that hardware engineers build theirs, by reusing Software-ICs supplied by a marketplace in generic components rather than by building everything from scratch. The environment is based on conventional technology

It190 Ip1 Essay

349 words - 2 pages Overview Professor Charles Beverly July 10, 2015 Information systems have made such a huge influence to society as a whole, and without them the everyday life that in which we are accustomed to would not be possible. Social media, shopping, e-mail, the internet, communication, and many other services are made possible due to the information systems. Both software and hardware are used to manage and process all the information that is stored and