Info Tech Essay

1594 words - 6 pages

Unit 1: Fundamentals of Hardware and SoftwareSystems and Application Software Hand -OutA computer system is consists of hardware and software. Software or programs is used to complete any activity/ task on a computer. Software can be used for running the hardware or for performing various tasks. There are two major categories, namely:System softwareApplication softwareSYSTEM SOFTWARESystem software are programs that enables the computer system to run properly and efficiently. Systems software must be installed before application software can run. There are three types:Operating systemUtilitiesTranslatorsOperating System (OS)An operating system is a system software that enables the hardware devices to function together as a computer system.Booting is the process of the operating system being loaded into the computer when it is started up.Some examples of OS are Windows, UNIX, Linux, Mac OS and DOS.Functions of OSFile Management- all the files created in secondary storage media, such as the hard disk, are stored within its various files. The OS is responsible for creating, deleting, renaming of files and folders and also making back-up copies of files.Memory Management- the Os allocates areas of memory to different programs so that each program can function effectively.Provide Security - modern computer systems require the entry of a password in order to access the system. The OS provide the user with password protection to prevent unauthorized access. It also provides backup and recovery routines in case of system failure.Input/Output Device Management - there are many peripheral devices such as keyboards, mouse and monitors that can be connected to the system unit. The OS makes the communication possible between the peripheral devices and the system unit.Provide a friendly user interface - the method by which user interacts with the computer system is called user interface. The OS provides the user with a friendly interface that will help the user to interact with computer system.Process Management- A program that is running can be considered as a process and a program can have many sub-program. Therefore, many processes would occur in a computer system when a program is being executed. The process management function of the OS involves allocating adequate time and recourses of the CPU to each process.Based on the type of operating system, it can also perform the following:Multitasking: this is when the operating system allows the user to perform several tasks at the same time, switch between them and share information.Multiprogramming: when users can run two or more programs at the same time using a single processor.Multiprocessing: when users can run two or more programs using multiple processors.Time-sharing: when each user is given a 'time slice' so that each user feels that they get the full attention of the CPU.UtilitiesUtilities are system programs that can be added to the main operating system to carry out extra tasks. Utility programmes...

Find Another Essay On INFO TECH

The World of Technology Meets the World of Education

853 words - 3 pages the traditional textbooks that are now in schools which can be as old as 5-7 years old. In order for the implementation of technology to be effective in our school, a great deal of planning must take place. For core curriculum planning to successfully embrace technology, writers need to be made aware to tech issues such as: If the computers are networked to file storage drives, printers, and the Internet; If accounts/passwords need to be

Students Using Technology to Cheat Essay

927 words - 4 pages classrooms. Most schools ban the use of cell phones, Personal Data Assistants and i-Pods in class, others do not. Does the new electronic detection device infringe upon individuals freedom, or going to become the new wave of the future.ReferencesMcCabe, Don. (2007). High-tech cheaters test educators. , (), . Retrieved, September 8, 2007Schmidt Erik, (2007). Exam Software Info. . Retrieved September 10, 2007Field, Mona., (2003, February 17). Cheating with

Architecture and College Choices

2257 words - 9 pages There are many colleges in the United States but not all of them have good programs in architecture. The colleges that I plan on going to would be Northeastern University, Academy of Art University, and Georgia Tech. I have used many different places to get my information on architecture and these colleges such as books over architecture, the schools main pages, InfOhio, Ebsco database, and many other sources. Architecture has always been an

The Digital Divide is a Myth

1514 words - 6 pages government intervenes. No hidden Armageddon exists inside this problem, and no money wasting policies are needed. The true nature of the info-chasm is simply a matter of personal choice based on a mixture of income, cultural background, and the interest level of the individual, commonly referred to as the natural human condition. Some researchers would like you to believe American firms are on the brink of being economically unstable because

What Caused the Virginia Tech massacre

1738 words - 7 pages intent of murdering several people; only a mentally ill person who became aggressive would go out and buy a gun for that purpose. Therefore, everyone should be trying to prevent the real cause of school shootings from occurring to prevent another tragic event from happening again. The main reason why school shootings, like the Virginia Tech Massacre, occur is that the shooters were mentally ill or depressed; the tragic events can be avoided if they

Analyzing the Aspects and Branches of a Career in Engineering

1178 words - 5 pages According to Georgia Tech school of Electrical and Computer Engineering, Engineering is the science of creating practical applications of the knowledge of pure science such as physics and chemical plants. What wastedtalent.org says about what engineers do on a daily basis is that most of them analyse, solve problems, plan, and communicate with eachother on a daily basis. Engineers do all type of work, each of them study a different field, they

Market research -a summary that i have compiled during studying malhotra's Basic Market Research book. summary of the most important (generally lectured) chapters.

3484 words - 14 pages number of factors should be analysed and evaluated. These factors include: past info & forecasts of the firm, objectives of DM, buyer behaviour, resources&constraints of the firm, legal and economic environment, marketing&technological skills of the firm.Analysis of the EnvironmentalContext should reveal DM problem which then be translated into MR problem, and be used to develop an approach.+ Researcher must avoid defining the Mr problem

Personal Privacy and Companies

1094 words - 4 pages methods used use keep tabs on people are very High tech. Biometrics, database mining and compulsory databases are just a few but the most talked about. Companies and other institutions are using the methods to learn more about people. Not all the information is being used for harm. Some companies will use the information to better serve the community but mostly all your hear about is the negative, so we will keep that theme. Some

Glasses of the Future: Google glass

1589 words - 7 pages /info-tech/controversy-grows-over-googles-glass-project/article4553860.ece Retrieved from Ackerman, E., "Google gets in your face [2013 Tech To Watch]," Spectrum, IEEE , vol.50, no.1, pp.26,29, Jan. 2013 doi: 10.1109/MSPEC.2013.6395302 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6395302&isnumber=6395279

NSA SURVEILLANCE

1684 words - 7 pages highly classified files. This started an outrage from US citizens. Many people are asking the same question now, which is what info is being collected and what gives them the right to do this. The spying, listening to conversations, data collection and many more things all started when President Bush asked the NSA to search for terrorist activity in the United States a couple weeks after 9/11. This usually requires a search warrant, which is given

The Truth Behind Computer Hackers

1179 words - 5 pages somewhere in between good and bad. They will use criminal techniques to find any holes in there employer's firewall. Finally, there are the black hats. Now, these are the actual criminals. They break into your computers and steal everything from bank accounts info to your Facebook login. Basically anything that they can use to make your life horrible and theirs great. However, hackers are the reason why we have so many tech advancements today. For

Similar Essays

Reconstruction Of Image With Hebcot Compression Technique

2420 words - 10 pages handling will be outsourced by the direct cloud service supplier (CSP) to different entities within the cloud and theses entities can even delegate the tasks to others, and so on. Second, entities square measure allowed hitching and leaving the cloud in a very versatile manner. As a result, knowledge handling within the cloud goes through a fancy and dynamic ranked service chain that doesn’t exist in standard environments. The Cloud info

Green It Essay

8660 words - 35 pages Green IT: Why Mid-size Companies Are Investing Now INFO-TECH RESEARCH GROUPGREEN IT: WHy MId-SIzE COMPANIES ARE INvESTING NOW Environmental issues are receiving unprecedented attention from businesses and governments around the world. In a special 2005 address to the World Economic Forum in davos, then-Prime Minister of the United Kingdom, Tony Blair, argued that the weight of evidence is such that swift action must be taken to address global

Software Developers: Web Design Essay

1741 words - 7 pages computer support tech I knew those classes would be great for my future. These courses take you through a computer's hardware and software and their components. Support tech is the more hardware-based class while web design was the software-based course. Both, however, are important in the software job field. Web design teaches you a language called Hyper Text Markup Language (or HTML). HTML is the main foundation of every program you use. Browsers

Organizing Management Essay

1024 words - 4 pages resource management are used within the organization.Verizon is sponsoring an innovative T.V. series, "My Home 2.0," this series will transform two ordinary families' homes into technology wonderlands (N.A. 2008)". The purpose My Home 2.0", a reality-based program, is to show families how they can realize the full potential of technology to improve their lives. Each show will give a family desperately in need of new technology a complete high-tech