This website uses cookies to ensure you have the best experience. Learn more

A Report On Computer Peripheral Architecture

1312 words - 5 pages

Date: December 5, 2009This report will discuss the various peripherals being used in virtual environments. There are three main areas are to be researched into, which are Data storage and representation, Environment manipulation, and Communication. These days, a lot of new peripherals are being introduced which run at greater speeds. Thus there is the need for more interactivity for applications. Most interface are also becoming smaller and more of them are now wireless equippedData storage and representationa.Provide details of areas that the company will need to research. For example, methods and the type of data that may need to be stored and transferred both to and from future peripherals.The computing industry has a second definition of primary and secondary storage that refers only to secondary storage. In this definition, primary devices refer to the computer's main storage device, such as an IDE or SCSI hard drive. Secondary devices, under this definition, are any non-primary storage device, such as a tape drive, writeable CD-ROMs or removable flash drives.Each type of storage media has different applications. Hard drives are the best choice for large volume, primary data storage. Regardless of the hard drive technology, the hard drive sacrifices speed for storage capacity and density when compared to volatile storage devices such as RAM. RAM, on the other hand, is not typically used for file system data storage because of its non-permanent nature. Because of its high-speed connection to the computer's CPU, RAM makes the best choice for primary storage. RAM typically can store and retrieve data at speeds that exceed 4 to 5 times that of the fastest hard drives.Writeable CD-ROM media, tape drives and flash drives make good choices for secondary storage devices (using either definition). These devices are often removable and, with the exception of magnetic tapes, offer higher reliability than hard drives that are dependent on moving parts. Computer users often depend on these devices to store backup or archive information, or to carry data that must be easily portable from site-to-site."A character file may be transferred to a host for one of three purposes: for printing, for storage and later retrieval, or for processing. If a file is sent for printing, the receiving host must know how the vertical format control is represented. In the second case, it must be possible to store a file at a host and then retrieve it later in exactly the same form. Finally, it should be possible to move a file from one host to another and process the file at the second host without undue trouble. A single ASCII or EBCDIC format does not satisfy all these conditions." (DATA REPRESENTATION AND STORAGE)Flash drives, tapes or Zip disks. Unlike secondary storage, primary storage is volatile and all primary storage information is lost when the computer is powered down. Secondary storage devices are non-volatile and store information not currently being processed by...

Find Another Essay On A Report on Computer Peripheral Architecture

A Report on Esther

2944 words - 12 pages that Mordecai was given an official position at the King’s gate (2:21). Here he came to know two officers, Bightan and Teresh, in the king’s service. At this time Mordecai learned of their plot to assassinate Ahasuerus. Mordecai then informed Esther of their plot who in turn informed Ahasuerus. Mordecai accusations proved to be true, and the two officers were hung on a gallows (2:21-23). Thereafter, Haman came into the story as one of

A Model-Driven Architecture Approach to the Efficient Identigication of Services on Service-orientated Enterprise Architecture

1288 words - 5 pages Abstract—Service-Oriented Enterprise Architecture requires the efficient development of loosely-coupled and interoperable sets of services. Existing design approaches do not always take full advantage of the value and importance of the engineering invested in existing legacy systems. This paper proposes an approach to define the key services from such legacy systems effectively. The approach focuses on defining these services based on a Model

Research on a Career in Computer Animations

1557 words - 7 pages computer animator vary depending on a few factors. These include where you work, what you do, and how you work for. The hours are your usual 9am to 5pm. I was unable to find anything unusual about this job.☺ For this job there are no gender restrictions, no racial restrictions, and very minor age restrictions. Most Jobs prefer there workers to be at least 21 years of age to be able to work there, however, there are a few exceptions depending

A Study on Testing of Service Oriented Architecture

1133 words - 5 pages , Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA 2009 Kenny Bellew, Tori Sadler, “Mobile usability testing Problems and solutions”, Research Report, at conference QAMT Ukraine, BugHuntress QA Lab, November 1-2, 2007. Evan Martin, Suranjana Basu and Tao Xie, “WebSob: A Tool for Robustness Testing of Web Services”, 29th International Conference on Software Engineering (ICSE'07 Companion) 0-7695-2892-9/07 2007

Illustrative Essay on Buying a Mac Computer

725 words - 3 pages Illustrative Essay The Apple store may have some expensive products; however they have some of the best customer service you can buy. When buying our new, much needed, MacBook, we went to the Apple store to pick it up and look around. Between the friendly staff, to the great layout, we had a great time at the Apple store in Raleigh. Apple makes some of the most amazing products on the market. However no one really talks about their stores. My

Opinion on Case of a Computer Hack

687 words - 3 pages Introduction In Case study number one (Dhillon, 2007), Stellar University(SU), which is public education institution, had a system breach in its Information Systems(IS). The IS of SU contained many types of IT such as Mainframe, AS400, Linux, VAX, Unix, AIX, Windows(3.1 and up to 2003), Apple, RISC boxes Storage Area Networks(SAN), Network Attached Storage(NAS) and much more. Sadly, SU has had a security breach on some of its systems. Even

Report on the Art and Architecture of the Cathedral of St. Stephen in Australia

2011 words - 8 pages 1.0 Introduction The purpose of this report is to outline the art and architecture of the Cathedral of St. Stephen and compare it to other churches around the world. It is also designed to analyse the aspects of St. Stephen’s architecture and its attempts to capture some of the unique experiences of people in Australia. Also analysed was how a Catholic community can impact the identity of its parishioner as well as the importance of

A report on Marie Curie

1308 words - 5 pages as she held the world in wonderment of her sheer greatness in and out of the laboratory. Marie Curie was not just a great scientist, she was a great person.Maria Sklodowska was born in Warsaw, Poland on November 7, 1867. She was the fifth and youngest child of Bronsilawa Boguska, a pianist, singer, and teacher, and Wladyslaw Sklodowska, a professor of mathematics and physics. Her life was destined to be filled with great success from the time

Write an newspaper report on "Maintaining your computer" and it's value to us

511 words - 2 pages week.Instructions: Click on the start menu and then on All programs In the Accessories submenu you will see a menu called System Tools. In this menu click on Disk Defragmenter. You will see towards the top of the screen, a list of all your physical Hard Drives. Select the System drive, ie: the one that has Windows installed on it. Then click on Defragment. Repeat this process on all your drives.The Disk Cleanup utility cleans up your computer of all

Current Research on a New Spacecraft Autonomy Architecture named Remote Agent

2251 words - 9 pages Remote Agent Part 1: Introduction to Spacecraft Autonomy Abstract This first paper of a two-part series introduces current research on a new spacecraft autonomy architecture, named Remote Agent, which applies artificial intelligence techniques to spacecraft control functions. The necessity for autonomy technology is nowhere greater than in deep space missions. Remote Agent is a model-based autonomous system being developed in a

Lab report on a fischer esterfication

868 words - 3 pages this radiation and reverse their spin and now oppose the applied magnetic field. The frequency of radiation needed to induce spin conversion is a direct function with the strength of the magnetic field. This amount of energy that is needed to induce the change in spin must have a frequency that matches its angular precessional frequency. This is called a resonance condition and this is what is graphically interpreted on a NMR printout.Objective

Similar Essays

Health And Safety Report On A Standalone Computer

4552 words - 18 pages Executive SummaryThe purpose of this report was to investigate the "Health and Safety" state of a standalone computer. The chosen computer is a Laptop Acer Aspire owned and used by Mike. This report tests a sample system in terms of security status and the test is conducted on that personal laptop. The aspects of the security testing include the checking of the current security applications of antivirus, firewall, adAware and other possible

Report On "Computer Games And Society"

736 words - 3 pages Report on "Computer Games & Society"Since games developed violence started increasing. Playing violent video games like Doom, Wolfe stein 3D or Mortal Combat can increase a person's aggressive thoughts, feelings and behaviour both in laboratory settings and in actual life. These kinds of violent games can affect the person's behaviour. Children could be affected negatively by violence computer games or other video games. One of the dangerous

Management: Report On A Case Study. An Architecture Firm With Management Problems And This Report Identifies The Problem And Attempt To Solve It

3133 words - 13 pages the work, some stationary, food, drinks, and some electricity used in operating computer or overhead projector.6.3 Solution: Hire a manager.A new manager can be find by simply put up an advertisement in the newspaper and on the website. The requirements will be experienced, charismatic, inspirational, people skilled, have some architecture skills and enthusiastic. People who are able to meet these requirements can then be interviewed and

A Report On Bats

1534 words - 6 pages A Report on BatsINTRODUCTIONThere is an abundant amount of animal species in theworld. They all have adapted and evolved to survive intheir surroundings. Some have grown fins, others legs, andstill others wings. One of the animals that has grown wingsis the bat. The bat is a truly great creature. It has allthe characteristics of mammals while also possessing theskill of a bird in flight.There are more than 800 species of bats in theworld. They