Free Essay

Computer Information Paper

In:

Submitted By sirgeek
Words 1562
Pages 7
Computer Information Paper
Accuracy of data input is important. What method of data input would be best for each of the following situations and explain why:
•Printed Questionnaires – The mode of data input will be decided on the basis of model of printed questionnaire. If the questionnaire consists of multiple choices, optical scanner is the best choice. The keyboard typing or uploading the scanned version of written paper is suitable for theoretical a paper which requires description about the topic.
•Telephone survey – Automated computer system to capture the details of survey is best option as it reduces the margin of human error related to typo, grammatical mistake etc. if the instructions are clearly explained to participants. Otherwise, if it is abstruse paper which needs the presence of subject matter expert, human interaction is essential where responses can be recorded into the system.
•Bank checks – Automated scanners of bank checks provide the optimal choice of getting the information in efficient manner to reduce the human errors. Still manual check is required to verify the correctness of details whether system has uploaded the exact description mentioned in checks without losing some details due to customer’s error or misinformation.
•Retail tags – RFID for International bar code is best method of input in the case of identifying the information embedded in retail tags. It can be problematic in the case when wrong bar code is attached to the item. But it can be rectified easily by attentiveness of sales person or customer. Still if there is lack of RFID process, then human intervention is possible choice for recording the details.
•Long documents – Automatic uploading process of scanned version of long document is most suitable choice if paper format of long documents is already available. Manual typing becomes essential in the absence of paper version.
Convenience and quality of output are important. Explain what method of output would be best for each of the following situations and explain why:
•Hand held computer– Personal Digital Assistant along with blackberry are leading products in handheld devices which can provide all the basic operations of computer like email, Microsoft office, internet access, multimedia files. It retains all the functionality of regular phone. They resemble in high resolution of larger computer but there is definite gap in size of hard disk. It is sufficient for small operations but ease of navigation in big screen through files makes them better choice for tedious assignment. Portability is obvious advantages in handheld computers in comparison to laptops or desktops.
•Color photograph – Professional quality of high resolution is difficult to match in the case of color photograph. Arrival of niche products in digital cameras is reducing the gap from film cameras. There is user-friendly behavior of these cameras to upload on computers and take the print outs. It provides good options for amateur which is cost-effective also. Multiple copies of any photo are also available at tip of finger.
•Resume – Electronic version of resume provides the accessibility to each stakeholders without going through hassles of mailing process involved in sending the hard copy of the file. It can be easily emailed to everyone without any need of physical transportation. Once the process of selection or need of resume is over, it can be kept in the office file for the sake of record.
•Memorandum – Intranet or internal email system with secured features provides the option of sharing the information without threat of malicious attack of virus from outside agency. The firewall and monitoring system of company protects the information which can be leaked to external sources. Still it is impossible to achieve full proof system because it depends on many factors including sincerity of employees.
•Statistical report – This kind of report can be published using the internal bulletin in the form of PowerPoint presentations, statistical graph in excel sheet or just as plain text on the dash board. The highlights of important statistical achievement create visual impression to emphasize the relevant points. If senior management can take the responsibility of presenting the papers in podium which allows human interaction to understand the process, it will leave reasonable impact. Afterwards, the handouts for presentation can be messaged through mail to concerned persons.
•Company annual report – This is one of the important papers for discussion. Paper format is costly as volume of papers will be high in the case of large documents. Still paper form can be provided to important stakeholders along with messaging electronic version of annual report to each interested persons. Investors and business client will find easy to maintain soft copy of the report to access them for financial analysis whenever they want.
Different types of storage devices are optimal for different situations. Explain what situations are appropriate for the following devices and explain why:
•Hard disk - Hard disk is high capacity storage that is made up of many circular and inflexible platters where data can be stored electronically. Miniature hard disk has greater storage capacities than flash memory but lesser than laptop hard disk. External and removable hard disk is utilized for back up or transferring the file. External hard disk is connected to system unit whereas removable hard disk can be inserted or removed.
•Floppy disk – This has become obsolete after arrival of flash drive and other portable devices with higher data storage capacity. It is useful in the case of small files. It is slow method of storing data. Current products of computer do not create floppy disk drive.
•RAM – RAM stands for random access memory which is used for carrying the task of runtime operations. It stores the data in integrated circuit form in CPU where each data can be accessed randomly without any association with order of data or location. It has second fastest retrieval time of data after cache. Once the task is completed, RAM releases the memory as it is case of volatile memory. Latest series of computer products can provide up to 8 GB of RAM.
•CD ROM - CD-ROM is compact disc read-only memory where contents cannot be deleted or changed. Its capacity is around 650 MB to 1 GB. In recordable CD, you can write the content once but it can’t be erased whereas rewritable CDs allow to record and write multiple times. Arrival of recordable CD has given the option of collecting different set of images, audio and video files at your own choice.
•Tape – Tape is useful for backups of huge volume of data which has slow data storage time. Hence it is advisable to avoid using it in real time. Still it is good choice of storage as back up in the case of crash of hard drive. It has also become obsolete like floppy drive.
•Flash or Jump Drive – Flash Drive which is also known as Jump Drive can be plugged into any USB slot. Its pocket size feature with data storage capacity up to 128 GB starting with 64 MB is setting it as standard device. It is compatible with most of the latest PC versions with occasional cases of incompatibility.
Explain the role of each of the following in determining the speed of a computer:
•RAM - (Random Access Memory) Since RAM is the second fastest retrieval time of data after cache, its best to have the recommended amount of memory. With windows 7 64-bit the minimum required is 2 GB and 32-bit is 1 GB (Microsoft, 2010, p. 1) I personally use 6 GB of RAM with Windows 7 64-bit. There is also speed associated with memory 1066MHz to 2000MHz the faster the better.
•Clock speed - Clock speed is a measure of how quickly a computer completes basic operations. It is measured as a frequency in hertz, and most commonly refers to the speed of the computer's CPU, or Central Processing Unit. A 3.4GHz computer is running 3,400,000,000 cycles per second.
•Data on hard disk – Data on a hard disk is accessed via its interface, IDE, Serial ATA (SATA), and Small Computer Scientific Interface (SCSI), It is a permanent storage component unlike the RAM. Hard Drives speed is measured in three areas oMaximum Transfer Rate – The highest amount of data that can be transferred per second. an ATA100 disk would be 100Mb/s o Spindle Rotation Speed - The faster the rotation speed, the more data can be written per second. oSeek Time - seek time of a hard disk is the average time it takes for the disk to find the data.
•Data on CD ROM - CD-ROM drives are rated with a speed factor relative to music CDs (1× or 1-speed which gives a data transfer rate of 150 KiB/s). Drives today are available at speeds up to 52x.
•Data on floppy disk – floppy disk have fallen to the side with the cost of hard drive became affordable. The floppy drive was never a speed daemon, but allowed quick transfer of files between workstations referred as Sneaker net. References
CRUCIAL. (2010). Computer memory requirements: How much memory do you need?. Retrieved from http://www.crucial.com/support/howmuch.aspx
Microsoft Computer Dictionary 6th Edition CHM Book. (6th Edition ed.). (14:Mar:2009). Retrieved from http://www.ebooksdownloadfree.com/Computer-Hardware/Microsoft-Computer-Dictionary-6th-Edition-BI827.html
Microsoft. (2010). Windows 7 system requirements. Retrieved Sep 9, 2010, from http://windows.microsoft.com/systemrequirements

Similar Documents

Free Essay

Computer Information Paper

...Computer Information Paper Computer information can be input in several different manners. Data may be input through a keyboard which is a device that allows the user to type the information directly into the computer. The keyboard is the most common and most utilized input device. An example of when the keyboard would be the best input device is printed questionnaires. Answering a questionnaire or conducting a telephone survey could be accomplished quickly and easily by simply typing the necessary information into the computer. Bank Checks are best entered by utilizing scanning technology similar to barcode scanners which are used on retail tags. A scanner reads the bar code and enters the information which the bar code represents. This method eliminates human error and insures the information is entered correctly. If it is necessary to input a long document, an optical scanner is the best choice. The optical scanner scans the entire document, page by page, and sends the document to a file folder for storage on a computer or storage device or to a printer if a printed copy is necessary. This method is fast so it only takes a few seconds to scan a long document into a computer file. Convenience and ease of use is important in for output devices. Hand held computers output information through visual output to video monitor or screen. Photographs are best input utilizing files such as JPEG and a scanner. Resumes and memorandums may best be output to a printer of email...

Words: 320 - Pages: 2

Free Essay

System Evaluation Paper/Cis/319 - Computers and Information Processing

...System Evaluation Paper Professor Mathew Mower CIS/319 - COMPUTERS AND INFORMATION PROCESSING January 21, 2013 Introduction I have been extended the reward of being employed for Yellow Freight Company (YRC), for over 17 years. YRC Freight is a subsidiary of YRC Worldwide Inc., a Fortune 500 company and one of the internationally. With headquarters in Overland Park, Kan., YRC Worldwide employs 55,000 people. I have witnessed many company changes. Yellow Freight was established in 1924. One of the most remarkable displays of our company is our 18 wheelers that are painted in a bright orange color. In the beginning CEO Harrell hired a chemist to find out what was the safest color on the highways of America. The results of the research led to swamp holly orange; was not only the safest, but the most visible from the greatest distance. On Feb. 1, 2012 YRC took another significant successful step, becoming one of the largest operating freight companies. Much more than a new name and logo, this rebranding signals our intent to focus on our core business, helping less-than-truckload shippers throughout North America increase the dependability and reliability of their supply chains. Today, we remain true to our founders' early dedication to safety and service. Their hard work and determination was the foundation for our success and has contributed to the success of thousands of customers. YRC has continue to prosper from the start. There is no surprise, given the founders'...

Words: 722 - Pages: 3

Free Essay

Business Ethics

...are, and the reasons why the acts were created. Discuss the differences between the Article 2 of the UCC and the UCITA. Determine the distinction between selling a product and licensing that product legally. Discuss the reasoning for drafters to propose a separate and distinct uniform act. UCC and UCITA Act UCC stands for Uniform Commercial Code, and that is a code that addresses the majority of aspects of commercial law. (No Author, 2011) UCITA stands for Uniform Computer Information Transactions Act, and that code is to regulate transactions in computer information products. But before the UCC and the UCITA act there was the Interstate Commerce Act of 1887. The act was put in place to normalize railroads that saturated the states boundaries. (U.S. News, 2012) Even though each one of the acts are different and provide different provisions, they all have something in common, they all create a better way to provide uniformity in commercial law between states. The Uniform Computer Information Transaction (UCITA) act started out as an amendment to article 2 of the Uniform Commercial Code (UCC), but there were so many disagreements with the amendment, that it was decided to rename it the UCITA and to keep it moving as a separate act, and it was approved in February 2000. (Andersen, Raymakers, & Reichenthal, 2001) The difference between selling a product and licensing a product is when you are selling a product it is a product that has gone through licensing and...

Words: 408 - Pages: 2

Free Essay

Ucc vs. Ucita

...U.S. government in regulating commerce. It supplies Congress with the sanction to regulate not only business, but any interaction conducted between organizations situated in different States (Gibbons v. Ogden (1824)). This authority encompasses all areas of interstate commerce (radio, telephone, waterways, highways). This also incorporates intrastate handling that has a collective and significant influence on interstate trade (employment, agricultural, and housing prejudice). * Based on the information presented above, what do you see as the major differences between Article 2 of the Uniform Commercial Code and UCITA? Article 2 of the UCC is designed to expedite the sale, consignment and distribution of tangible products. A tangible product is one in which you can touch or feel (Robyn Spelts. June 24, 2011). The purpose of Article 2 is to bring sales law closer to the needs and practices of businessmen. The UCITA is anticipated to simplify the authorizing of intangible computer-related property, with a prominence on allowing proprietors of software the capability to preserve domination over their possessions eternally. An intangible product (that still also counts as a product in the business marketing mix) is one that cannot be touched. Examples of this are commercials, repair work, and tax preparation. Other examples of products are places and ideas (Robyn Spelts. June 24, 2011). The concern comes from the overwhelming power of the software designer and the lack of...

Words: 803 - Pages: 4

Premium Essay

Data Storage and Architecture

...Data Storage and Architecture Kaplan University Introduction Commerce is the conducting of business; it could be buying, selling, marketing, or providing services. The newer forms of commerce are electronic commerce (e-commerce) and mobile commerce (m-commerce). The types of e-commerce are business-to-business, business-to-consumer, and consumer-to-consumer. The traditional commerce practice required consumers to buy at a retail location, order from catalogs over the phone, or fill out order forms to mail in. These processes where lengthy and inconvenient to consumers needing products fast or even business needing a rush order could still take weeks. E-commerce emerged eliminating the long processes of ordering and waiting on receipt of order, then processing; to just clicking buttons and shipment within hours or days. E-commerce and M-commerce have many benefits to businesses and consumers but as with any great thing there are challenges. In attempting to implement a multi-stage model for e-commerce with global systems, the key challenges are; cultural, language, time and distance, infrastructure, currency, and state, regional, and national laws. Cultural challenges Culture includes difference in morals and beliefs, language, currency, laws and the way individuals as well as businesses function. Cultural challenges occur when the major understandings and assumptions of the business leaders is different from the consumer or other business, in which business is to be conducted...

Words: 1637 - Pages: 7

Free Essay

Legal and Ethical Environment of Business

...and practical commerce and be technologically neutral. Can you create a new computer chip design it , bubble wrap it and ship it for sale and still have ownership of that computer chip? With the Uniform Commercial Code and Uniform computer Information Transaction Act they will shed light of how you are protected by the government. Not just consumers but business are govern a like . . Before the UCC and the UCITA, the first U.S attempt to promote uniformity in commercial laws from state to state is the commerce clause. The commerce clause of the constitution, provides congress with authority to regulate business in different states. The commerce clause extends to all instrumentalities of interstate commerce as well as to intrastate conduct that has substantial effect on interstate commerce. The UCITA is intended to facilitate the licensing of computer related intellectual property, with an emphasis on permitting owners of software the ability to maintain control over their intellectual property forever. The UCC is designed to facilitate the sale, shipment and delivery of tangible goods identified in a contract. The biggest difference I see between UCITA and UCC is UCITA gives the software designer control of their property even after sale of their property, where as the UCC is only concern with getting the product to the consumer. After I the consumer buy a computer I wouldn’t want Sony to come to my home and tell me they have to take their...

Words: 485 - Pages: 2

Premium Essay

Augmented Reality

...Augmented Reality: Linking real and virtual worlds A new paradigm for interacting with computers Wendy E. Mackay Department of Computer Science Université de Paris-Sud ORSAY-CEDEX, FRANCE E-mail: mackay@lri.fr ABSTRACT A revolution in computer interface design is changing the way we think about computers. Rather than typing on a keyboard and watching a television monitor, Augmented Reality lets people use familiar, everyday objects in ordinary ways. The difference is that these objects also provide a link into a computer network. Doctors can examine patients while viewing superimposed medical images; children can program their own LEGO constructions; construction engineers can use ordinary paper engineering drawings to communicate with distant colleagues. Rather than immersing people in an artificiallycreated virtual world, the goal is to augment objects in the physical world by enhancing them with a wealth of digital information and communication capabilities. KEYWORDS: Augmented Reality, Interactive Paper, Design Space Exploration, Participatory Design INTRODUCTION Computers are everywhere: in the past several decades they have transformed our work and our lives. But the conversion from traditional work with physical objects to the use of computers has not been easy. Software designers may omit small, but essential, details from the original system that result in catastrophic failures. Even the act of typing is not benign: repetitive strain...

Words: 5459 - Pages: 22

Free Essay

Lims

...Two ways that the laboratory information is stored is manual and computer based. Manual type of information is when it is written by the person who is writing about laboratory based information. Manual information is stored on paper and so it can be put in archive where it can then be accessed by laboratory worker who needs specific information about laboratory whether it is for report records or scientific data. On the other hand computer based information is when it is typed up on the computer and stored on hard drive of the computer. It can be accessed by finding the wanted file on the hard drive and use the information for laboratory purposes. Advantages of manual storage is that it is a physical copy therefore it is better than computer based copy as it is more reliable. Secondly, manual data cannot get corrupted which means that the information is less likely to get damaged. Also it is less likely for the data to get lost as it will be put in archive and stored then when the file is needed laboratory worker can access it by going into the room where data is stored and then use the file for the purpose needed. Disadvantages of manual storage is that not everyone can understand the writing of the person that wrote about the laboratory information. Secondly, even though it is stored in the archive it can still get lost as it is wrote on paper and paper can get easily lost and damaged if not stored at the right place. To add on it can get damaged such as get ripped and therefore...

Words: 608 - Pages: 3

Free Essay

Assignment and Essay.... Others)Information Technology (Programming/ Languages (Java, C++, Vb,.Net, & Etc)/Database Design/ Computer Networking/ System Analysis/ Project Management/Project Development/ It & Society/ and.

...ASSIGNMENT and ESSAY. ... others)Information Technology (Programming/ Languages (Java, C++, VB, .NET, & etc)/Database Design/ Computer Networking/ System Analysis/ Project Management/Project Development/ IT & Society/ and. - NET programmers continue to struggle with the complexities of a hybrid managed/unmanaged environment. ..... Sorry, I had to laugh at that paper! ... Java on the other hand is cross-platform, and also traditionally runs as an ... - NET programmers continue to struggle with the complexities of a hybrid managed/unmanaged environment. ..... Sorry, I had to laugh at that paper! ... Java on the other hand is cross-platform, and also traditionally runsASSIGNMENT and ESSAY. ... others)Information Technology (Programming/ Languages (Java, C++, VB, .NET, & etc)/Database Design/ Computer Networking/ System Analysis/ Project Management/Project Development/ IT & Society/ and. - NET programmers continue to struggle with the complexiASSIGNMENT and ESSAY. ... others)Information Technology (Programming/ Languages (Java, C++, VB, .NET, & etc)/Database Design/ Computer Networking/ System Analysis/ Project Management/Project Development/ IT & Society/ and. - NET programmers continue to struggle with the complexities of a hybrid managed/unmanaged environment. ..... Sorry, I had to laugh at that paper! ... Java on the other hand is cross-platform, and also traditionally runs as an ... - NET programmers continue to struggle with the complexities of a hybrid managed/unmanaged environment...

Words: 784 - Pages: 4

Premium Essay

Club It Part One

...Information Systems and Software Applications 1 Software Application and Information System Marguerite Moore Business Information Systems/BIS2 February 21, 2011 Chiedo Ugorji InformationSystems and Software Applications 2 - Please remove. Management Information Services A management department uses a computer based system that provides managers with the tools needed to organize, evaluating, and they run their departments more efficiently. They use software that can look at the past, present, andthefuture information. This is calledthe Management Information Service that includes the software to run the databases, the decision support system, and they also have applications that can run the department of the business more efficiently. These systems (management information systems) provide the department employee with the information to run his operations. It also supports the planning, effective resource...

Words: 978 - Pages: 4

Premium Essay

Office Automation Sys

...set of people "executing their procedures" ("carrying out tasks"), communicating with and referencing a supporting file system. e A set of communication media with thei:- corresponding communications, such as a filled-in fonn, a phone call, a copy of an order, or a file system query for organizing and processing information. e A gigantic database with users accessing and manipulating data. An automated office information system (0 IS) attempts to perform the functions of the ordinary office by means of a computer system. Automation in the office particl~larly aids the office worker in document preparation, information management and decision making. Such systems may be as modest as a group of independent word processors, or as complex as a distributed set of large, communicating computers. Within in this spectrum is a central computer with several interactive terminals, or a set of small interconnected computers. In either system the office worker would use a work station to perform his work, and that work station would be capable of electronically communicating with other work stations. In this paper we distinguish office information systems from data processing systems both by the autonomy of the system's parts, and by function. A data processing system is used to im A set of activities resulting from requests for service, each with a specific precedence. Each activity requires a supporting file system. e/\ set of people "executing their procedures"...

Words: 1924 - Pages: 8

Free Essay

Aaaaaaaaaaaaa

...[pic] University of Information Technology & Sciences (UITS) A Term Paper On How to build a computer Submitted By: Submitted To: Instructor Name : Md.Arif Rana Sr. Lecturer, School of Business, UITS. Submission Date: 13th December 2010 Letter of Transmittal 06 April, 2010 Md.Arif Rana Sr. Lecturer, School of Business. UNIVERSITY OF INFORMATION TECHNOLOGY AND SCIENCES Subject: Application for accepting term paper on How to build a computer. Dear Sir, We have the pleasure to submit here with the term paper titled “How to build a computer” as a requirement for our Fundamental of computer(CSE101). Based on discussion and survey, we have incorporated the necessary materials to finalize that term paper. We are particularly grateful to Md.Arif Rana (Sr. lecturer, School of Business) for his co-operation in helping us to achieve our purpose. We also acknowledge our gratitude to those persons who have helped us and passed their valuable comments on the draft term paper. If you need assistance in interpreting this term paper please contact us at any time. Sincerely yours...

Words: 539 - Pages: 3

Free Essay

Nothing

...LIST FOR THE CERTIFIED INFORMATION COMMUNICATION TECHNOLOGISTS (CICT) EXAMINATION CICT PART I |SECTION 1 | |PAPER NO. 1 INTRODUCTION TO COMPUTING | | |TITLE |AUTHOR(S) |PUBLISHER |EDITION | |1. |Fundamentals of Computers |V. .Rogerman |PHI Publishers |Latest edition | | | | | | | |2. |Principles of Computer Science |Carol Reymolds | |Latest edition | | | |Paul Tyman | | | |3. |Computer Fundamentals |Pradeep Sinha | |Fourth edition | |4. |Essential Computer Mathematics |Seymour Lipschutz |McGraw Hill |Latest edition | |PAPER NO. 2 COMPUTER APPLICATIONS (THEORY...

Words: 1075 - Pages: 5

Free Essay

Cis 417 Week 10 Term Paper

...TERM PAPER To purchase this visit here: http://www.activitymode.com/product/cis-417-week-10-term-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 10 TERM PAPER – INVESTIGATING DATA THEFT Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion. Write an eight to ten (8-10) page paper in which you: 1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab. 2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers. 3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing. 4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s). More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 10 Term Paper – Investigating...

Words: 784 - Pages: 4

Premium Essay

Social Engineering

...technology has become so integrated into our everyday lives that it is almost an impossible to imagine a world without computers. We have computers in our offices, our homes, our cars, our phones and laptops that we can carry from place to place. Without this technology, I wouldn’t be able to attend college courses online and therefore wouldn’t be able to one day earn a degree. However, one of the major issues that we face when doing all these things online is not being able to fully protect our information and our privacy. Computers around the world are connected via the internet and while this connection allows for easy access to information and communication, it also opens the user up to a new form of crime, social engineering. In my ????? class, Professor ???? talked about one particular example of social engineering dating back to ancient times, the Trojan Horse. It is considered one the most well-known examples of social engineering in history; a hollow statue built by the Greeks to allow them access to the city of Troy. This seemingly harmless wood statue was not apparent to be a threat by the Trojans and unfortunately resulted in the fall of the city of Troy to the Greeks. Social engineering works in somewhat the same way. In modern times it is a way for criminals to access your computer, office or confidential information for illegal purposes. In this paper, I will discuss 3 of the most common types of social engineering attacks; phishing, snooping and dumpster diving. ...

Words: 1031 - Pages: 5