Free Essay

Computers

In:

Submitted By drshay05
Words 2160
Pages 9
Sergio Malone

Chapter 1 Check Your Understanding

Which of the following statements accurately describe differences between a LAN and a WAN? (Choose two)

Companies can use a WAN to connect remote locations, and a LAN can make a local connection in a building D. Only WANs require a CSU/DSU to be used on the ends of the cable.

Network professionals belong to organizations that plan and define standards used in networking. Which of the following are recognized industry organizations? (Choose two)

A. IETF C. ISO D. EIA F. ITU

Which of the following are true about a router? (Choose three)

A. Routers enable different IP networks or IP subnets to communicate with each other. C. Path selection is one of the main functions of a router E. Routers have a central processing unit and memory.

Which of the following are main components of a router? (Choose three)

A. ROM B. Flash memory E. RAM

Which of the following statements describe the function of RAM in a router? (Choose two)

C. RAM stores the current configuration information. E. RAM stores routing tables for the router.

Which of the following statements are true about DTE? (Choose two)

C. DTE usually resides on the customer’s premises D. DTE is an acronym for data terminal equipment.

Which of the following statements are true about DCE? (Choose two)

B. DCE provides clocking to the DTE. C. DCE is an acronym for data circuit-terminating equipment.

The term WAN refers to which layers of the OSI model? (Choose two)

B. Data link D. Physical

Which of the following physical ports and/or cables on a router require clocking to be configured in a back-to-back connection? (Choose one)

E. Serial port with DCE cable

Which of the following statements are true about router interfaces? (Choose two)

C. Ethernet interfaces usually use rJ-45 connectors. D. Interfaces can accept smart serial connectors.

What are possible functions of a console port? (Choose two)

B. Accessing the router to change configurations D. Password recovery

In the following figure, which setting is different from the default for connecting to a Cisco router?

A. Bits per second

Which of the following are data-link encapsulations for WAN? (Choose three)

A. Frame Relay B. RIP C. IETF

Which of the following are used in WANs? (Choose two)

B. Router C. Modem

Which of the following describe the function of flash memory in a router? (Choose three)

A. Holds the Cisco IOS software image C. Keeps its contents when a router is rebooted D. Can store multiple versions of Cisco IOS software

Which of the following are true about out-of-band router management? (Choose three)

A. Can be performed using the console port with a rollover cable D. Can allow troubleshooting when a link is down E. Can be performed using a dialup connection

Which of the following are true about the items shown in the following figure? (Choose three)

A. Item B contains serial interfaces B. Items C and D can be used for router management D. Item B can accept either DTE or DCE cables

Which statement is true about a router? (Choose one)

B. NVRAM stores the startup configuration file, and RAM stores the running configuration.

Sergio Malone

Chapter 2 Check Your Understanding

Which statement best describes CLI?

C. It is a text-based interface using a keyboard

Which scrolling through output from a terminal session, the --More-- prompt indicates which of the following? (Choose two)

B. Press the Spacebar for the next page D. Press the Enter or Return key for the next line.

Which of the following statements are true about the different EXEC levels of access to a router? (Choose three)

B. Privileged EXEC mode permits commands that can change the router’s operation. C. Central_Office# is an example of a privileged mode prompt. E. Central_Office> is an example of a user mode prompt.

Which two commands ask the router to display a list of valid syntax to follow the word “show”?

A. show ? D. sh?

What is the likely reason for the following output fro a router? Central_Office# config trem -__

C. The ^ indicates that the letter r is not valid.

Which of the following are true about the terminal history? (Choose three)

A. Previous commands can be recalled using Ctrl-p. C. The command history is stored in RAM E. show history lists the commands in the history buffer.

Which command moves a user from the Router(config-router)# prompt to EXEC mode?

B. Ctrl-z E. end

Choose three true statements about setup mode.

A. It can be accessed using the setup command. C. It loads by default when a router is new and booted for the first time. D. It is an interactive dialog creating a configuration using a question-and-answer format.

A user tries to access a router’s enable mode by using the password configured in the enable password command. The router, however, denies access to the user. What are two possible explanations for this problem?

B. The enable secret command is configured. D. The Caps Lock key was on when was entered the enable password.

The command configure terminal is used from enable mode. When configure terminal is entered, which of the following are true? (Choose two)

B. The router enters global configuration mode. C. The router will accept a router rip command at this point.

Which command puts a router into routing protocol configuration mode?

A. router rip

Which of the following best describes the sequence of the startup process of a router?

C. Performing POST, loading bootstrap, loading IOS, loading the startup configuration

Which of the following are operating environments for a router? (Choose three)

A. Boot ROM (RX BOOT) C. ROM Monitor (ROMMON) D. IOS

Where can a router find an IOS image to load during startup? (Choose three)

A. Flash memory C. An external TFTP server E. ROM

Which of the following are information displayed by the Cisco IOS software show version command? (Choose three)

C. Router uptime and last restart method D. System image file and location E. Configuration register

What are the three methods to access the router’s CLI?

A. Terminal connection through the console port using a rollover cable D. Telnet via a console cable E. Modem connection via the aux port

Sergio Malone

Chapter 3 Check Your Understanding

Which of the following statements re true about router CLI modes? (Choose two)

A. The prompt indicates which mode a user is in. C. Global configuration mode allows configuration of settings that apply to the entire router.

Which of the following statements are true concerning passwords on a router? (Choose two)

B. The password defined by the enable password command is used only if the password defined by the enable secret password has not been configured. E. By default, the enable secret password is encrypted, and the enable password is not.

Which of the following answers imply the correct CLI mode and correct IOS command required to configure remote access to a router with a password of cisco? (Choose three)

A. Router(config)#line console 0 C. Router(config-line)#login E. Router(config-line)#password cisco

If an engineer wants to verify changes that she has been making on a router, which of the following commands will allow her to check the router’s current configuration before saving?

D. show running-config

Where should the clock rate command be configured?

D. On interfaces connected to the DCE cable

When in global configuration mode, which steps are necessary to edit an IP address on an Ethernet interface? (Choose two)

B. Enter interface configuration mode. D. Configure the IP address and subnet mask.

A company has specified a set of rules about how to configure various settings on the devices in its networks. What are the benefits of this? (Choose two)

B. It makes it easier to recognize problems that may arise on a network. D. Consistent design standards can be quickly understood by different engineers assigned to support the company network.

What is the purpose of the description command?

C. It explains an interface configuration.

Which of the following best describes the purpose of a delimiter when configuring a login banner?

C. The delimiter indicates the beginning and ending of the free text field.

What is the purpose of a host table? (Choose two)

B. It maps an IP address to device name. C. It allows engineers to ping remote devices using names instead of IP addresses.

Which of the following commands is the proper format for configuring a host table?

B. ip host boston 172.16.27.6

Which of the following are possible to back up a configuration file? (Choose three)

B. A TFTP server C. A network server E. A disk stored offsite in a safe place

What is the next step after entering the copy running-config tftp command?

B. Enter the IP address of the destination remote host.

Sergio Malone

Chapter 4 Check Your Understanding

What is the primary use for CDP?

B. To learn about all Cisco devices directly connected to an interface.

What information does the show cdp neighbors command provide for each CDP neighbor? (Choose three)

A. Device identifier C. Address list D. Port identifier

The show cdp interface command is used to display which one of the following?

A. The values of the CDP timers and the interface status

When used to test a network, which of the following does the show cdp interfaces command display?

A. Line and data link layer protocol status

What information is displayed by the show cdp neighbors command? (Choose four)

A. Decremented holdtime value, in seconds B. Local ports/interface types and numbers D. Neighbor device type, device ID, and port ID F. Platform type of neighboring devices

Which of the following is true for the output of the command show cdp entry [device-name]?

A. It displays the Layer 3 addresses configured on the interface that the neighbor uses to send CDP updates to the local router.

What is a definition for Telnet?

C. A protocol that allows a user to gain access to the CLI of a remote device.

Which of the following are true about Telnet? (Choose two)

B. The IOS telnet client allows for multiple concurrent suspended telnet connections. C. A user can suspend an IOS Telnet connection by pressing Ctl-Shift-6 and then x.

What four important pieces of information do you receive after issuing a ping command? (Choose one)

A. The size and quantity of ICMP packets, the timeout duration, the success rate, and the round-trip time.

In reply to the ping command, what do exclamation points (!) indicate?

A. The number of successful echo requests

What information does testing a network by using traceroute command provide?

C. It maps every router that a packet goes through to reach its destination.

Sergio Malone

Chapter 5 Check Your Understanding

Which of the following is not a boot option that can be set with the boot system command?

D. Cisco IOS Software will automatically boot form a previous IOS image.

Which of the following are information displayed by the show version command? (Choose two)

B. The name of the system image and its location E. The router platform and router uptime

Which command is used to discover the configuration register setting?

C. show version

What information is not implied by the Cisco image filename system?

D. The size of the image

Which of the following is the first step of the recommended procedure for loading a new Cisco IOS Software image to flash memory from a TFTP server?

C. Back up a copy of the current software image to the TFTP server.

What is the first location in which a newer 2600 series router looks for an IOS if the router configuration register is set to 0x2101?

D. Flash memory

Which of the following has a limited version of router Cisco IOS Software?

A. ROM

Which answer best characterizes how a router looks for an IOS if the router configuration register is set to 0x2102?

D. The startup-config file, to check for boot system commands

Which of the following is the default sequence used by the router to locate the Cisco IOS?

D. Flash memory, TFTP server, ROM

Which of the following is not displayed by the Cisco IOS show version command?

A. Statistics for configured interfaces

Which of the following statements are true regarding Xmodem? (Choose two)

C. Xmodem is the fastest way to lad an IOS. D. An IOS can be loaded via the console or aux ports using Xmodem.

Why is it important to create a Cisco IOS Software image backup?

D. To create a backup copy of the current image before updating with a new version

Which command is issued to upgrade an old version of the Cisco IOS Software by downloading a new image from the TFTP server?

B. copy tftp flash

Similar Documents

Free Essay

Computer

...Computer The word'computer ' is an old word that has changed its meaning several times in the last few centuries.The Techencyclopedia(2003) defines computer as " a general purpose machine that processes data according to a set of instructions that are stored internally either temorarily or permanently" Computer history The trem history means past events.It indicates the gradual development of computers.Here we will discuss how this extraordinary machine has reached of it's apex. In the begining............................... The history of computers starts out about 2000 years ago, at the birth of the 'abacus' a wooden rack holding two horizontal wires with breads strung on them.Just like our present computer,abacus also considered a digit as a singal or codeo and processed the calculation. Blasie Pascal ists usually credited to building the first digital computer in 1942.It added numbers to help his father.In 1671,Gottofried Wilhelm Von Leibniz invented a computer that was built in 1694.It could add,and, after changing somethings around,multiply. Charles Babbage: A serious of very intersting developement in computer was started in Cambridge,England,by Charles Babbage, a mathmatics proffessor.In 1982,Babbge realized that many lng calculations,espically those need to make mathematical tabes ,were really a series of predictable actions that were constantly repated.From this he suspected that it should...

Words: 995 - Pages: 4

Premium Essay

Computer

...Computer From Wikipedia, the free encyclopedia Jump to: navigation, search For other uses, see Computer (disambiguation). "Computer technology" redirects here. For the company, see Computer Technology Limited. A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem. Conventionally a computer consists of some form of memory for data storage, at least one element that carries out arithmetic and logic operations, and a sequencing and control element that can change the order of operations based on the information that is stored. Peripheral devices allow information to be entered from external source, and allow the results of operations to be sent out. A computer's processing unit executes series of instructions that make it read, manipulate and then store data. Conditional instructions change the sequence of instructions as a function of the current state of the machine or its environment. The first electronic computers were developed in the mid-20th century (1940–1945). Originally, they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers...

Words: 6579 - Pages: 27

Free Essay

Computer

...A proxy server is a computer that acts as an intermediary between the users computer and the Internet. It allows client computers to make indirect network connections to other network services. If use proxy server, client computers will first connect to the proxy server, requesting some resources like web pages, games, videos, mp3, e-books, any other resources which are available from various servers over Internet. As soon as getting such request, the proxy server will seek for the resources from the cache in its local hard disk. If the resources have been cached before, the proxy server will return them to the client computers. If not cached, it will connect to the relevant servers and request the resources on behalf of the client computers. Then it caches resources from the remote servers, and returns subsequent requests for the same content directly Functions of a proxy server * Help improve web performance by storing a copy of frequently used webpages * Help improve security by filtering out some web content and malicious software * Content filtering * Spying * To keep machines behind it anonymous (mainly for security). * To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server. * To apply access policy to network services or content, e.g. to block undesired sites. * To log / audit usage, i.e. to provide company employee Internet usage reporting. * To bypass security/ parental...

Words: 691 - Pages: 3

Premium Essay

Computer

...ages before, when there were no computers or any other technologies. So much we have advanced that now every information is just a click away and is in your hands 24/7. All this advancement was possible only with the introduction of a small device called the “Computer”. Computers Image Curtsey: csntrust.org.nz/attachments/Image/PC-picture-1.jpg?1367216528141 Basically, computer is a device that accepts the message by the imputer and processes this message and stores the information at the storage devices and later gives an output of the message through the output devices. A simple explanation of the computer. Normally, a computer consists of a processing unit called the Central Processing Unit or the CPU and a form of memory. In the years between 1940 and 1945 were the first electronic digital computers developed. The initial sizes were as big as a room and consumed power as much as today’s personal computers. Initially, computer was related to a person who carries out calculations or computations and as such the word computer was evolved in 1613 and continued till the end of 19th century. Later it as re-described as a machine that carries computations. The early computers were limited in their functions. It was the fusion of automatic calculation and programmability that produced the first computers that were recognized in 1837. Charles Babbage in 1837 was the first to introduce and design a fully programmed mechanical computer, his analytical engine. Due to limited...

Words: 999 - Pages: 4

Free Essay

Computer

...Assembly Language Programming Lecture Notes Delivered by Belal Hashmi Compiled by Junaid Haroon Preface Assembly language programming develops a very basic and low level understanding of the computer. In higher level languages there is a distance between the computer and the programmer. This is because higher level languages are designed to be closer and friendlier to the programmer, thereby creating distance with the machine. This distance is covered by translators called compilers and interpreters. The aim of programming in assembly language is to bypass these intermediates and talk directly with the computer. There is a general impression that assembly language programming is a difficult chore and not everyone is capable enough to understand it. The reality is in contrast, as assembly language is a very simple subject. The wrong impression is created because it is very difficult to realize that the real computer can be so simple. Assembly language programming gives a freehand exposure to the computer and lets the programmer talk with it in its language. The only translator that remains between the programmer and the computer is there to symbolize the computer’s numeric world for the ease of remembering. To cover the practical aspects of assembly language programming, IBM PC based on Intel architecture will be used as an example. However this course will not be tied to a particular architecture as it is often done. In our view such an approach...

Words: 85913 - Pages: 344

Premium Essay

Computer

...new releases and upgrades are made available from time to time. The database administrator will be aware of any new versions or upgrades to existing versions that could improve the efficiency of a currently installed database. In some circumstances database administrators are authorized to upload free upgrades and install them. In the event that a new version is available, the administrator will check with others in the company to determine if the cost of replacing the existing database software is worth the investment. Earnings for this job as of 2012 median of $77,080 per year and about $37.06 per hour, but the earnings can reach up to about $118,720; in the top 10 percent. Entry level education for this job is a bachelor’s degree in computer science, information science, or management information systems. The Bureau of Labor Statistics projects 15.1 percent growth of employment for database administrators;...

Words: 318 - Pages: 2

Premium Essay

Computer

...ile Format: PDF/Adobe Acrobat - Quick View by G Vink - 1998 - Cited by 1 - Related articles software-hardware interface debugging in an embedded environment. ... materials and processes used in manufacturing semiconductors, through to electronic design tools, packaging .... Next to this, for him, peripheral simulation is ... www.tasking.com/resources/debugtechn-trends.pdf ► The Technology Of Hims: Hardware, Software, Peripheral And ... Nov 9, 2010 ... The Technology of HIMS: Hardware, Software, Peripheral and Processes. Healthcare Information Management Systems (abbreviated as HIMS) are ... www.termpaperwarehouse.com/...Technology-Of-Hims-Hardware-Software/ 25880 - Cached About: Macs - Macintosh Hardware & Software Reviews, Tips, Guides ... Jan 9, 2011 ... Get the inside scoop on Macintosh hardware and software, plus tips ... Take a look at the process my wife and I experienced when we took the ... macs.about.com/ - Cached - Similar Motion Computing - Tablet PCs and Peripherals - Alliance Partners ... Sharing databases and processes, they'll help you improve communication and ... B Sharp Technologies is a software and services company providing web-based healthcare ... medical record) and HIM (health information management) software to .... in software licenses, software upgrades, hardware, and IT support. ... www.motioncomputing.com/partner/alliance.asp - Cached - Similar Critical Success Factors in Establishing the Electronic Health ... The electronic health record...

Words: 426 - Pages: 2

Premium Essay

Computer

...What is Computer : Computer is an electronic device that is designed to work with Information.The term computer is derived from the Latin term ‘computare’, this means to calculate.Computer can not do anything without a Program.it represents the decimal numbers through a string of binary digits. The Word 'Computer'usually refers to the Center Processor Unit plus Internal memory. Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions (called program) and gives the result (output) and saves output for the future use. It can process both numerical and non-numerical (arithmetic and logical) calculations.The basic components of a modern digital computer are: Input Device,Output Device,Central Processor. A Typical modern computer uses LSI Chips. Charles Babbage is called the "Grand Father" of the computer.The First mechanical computer designed by charles Babbage was called Analytical Engine. It uses read-only memory in the form of punch cards. Four Functions about computer are: accepts data | Input | processes data | Processing | produces output | Output | stores results | Storage | Input (Data): Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc. Process: Process is the operation of data as per given instruction. It is totally internal process of the computer system. Output: Output...

Words: 1953 - Pages: 8

Premium Essay

Computers

...The History of Computers From primitive abaci to lab tops and calculators, the computer has evolved through time to become the essential part of our technocratic society. The development of the computer has shaped the way technology and science is viewed in different cultures around the world. The connotation of what a computer is nowadays brings to mind a monitor, keyboard, processor and its other electronic components; however, that is not how things have always been. From the Chinese using abaci to count, to the Druids' usage of stones to follow the seasonal changes, to the Europeans using Pascalines and calculators to work out mathematical problems the concept of the computer has been around for hundreds of years (Hoyle). Therefore, the history of computers is important to observe not only for the influence it brought to our culture, but the progress it has made through time. The history of modern computers has been influenced by the earlier advancement of primordial technology. The abacus developed in circa 500 B.C for example, used pebbles, rocks, beads, or shells to keep track of the counters numbers. Furthermore, "the abacus was man's first attempt at automating the counting process" (Hoyle). In addition, the Pascaline, invented and built by a French philosopher and mathematician Blaise Pascal, was the first mathematical adding machine (Long 54). The Pascaline was a gear-driven machine that allowed the user to calculate answers without doing arithmetic (Hoyle). In...

Words: 803 - Pages: 4

Premium Essay

Computer

...Computer A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format. A computer can process data, pictures, sound and graphics. They can solve highly complicated problems quickly and accurately. Block Diagram Input Unit: Computers need to receive data and instruction in order to solve any problem. Therefore we need to input the data and instructions into the computers. The input unit consists of one or more input devices. Keyboard is the one of the most commonly used input device. Other commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. All the input devices perform the following functions.  Accept the data and instructions from the outside world.  Convert it to a form that the computer can understand.  Supply the converted data to the computer system for further processing. Storage Unit: The storage unit of the computer holds data and instructions that are entered through the input unit, before they are processed. It preserves the intermediate and final results before these are sent to the output devices. It also saves the data for the later use. Memory Size: All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is represented by an 8 bit code. The set of 8 bits is called a byte. A character occupies 1 byte space. A numeric occupies 2 byte space. Byte is the space occupied in the memory. The size of the primary storage...

Words: 9444 - Pages: 38

Premium Essay

Computer

...COMPUTER HARDWARE AND COMPONENTS COMPUTER HARDWARE AND COMPONENTS Computer Basics     Equipment (Hardware) COMPUTER | A machine that processes information and performs computations. | Tower or Desktop | The "box" or case that holds the parts that make up a computer:  CPU, hard disk drive, floppy drive, memory chips, power supply, interface cards, etc. Click here to learn more. | |      CPU | Central Processing Unit, or "brains" of the computer | Monitor | An output display device (looks similar to a TV) in a computer system.  You see information on the monitor's screen. | |      Screen | The viewing area on a monitor or the information or image displayed. | | | | Disk Drive | A device that reads data from (input) or records data onto a disk for storage (output). |     Floppy  | Floppy Drive | . 3-1/2" Floppy Disk |     Hard Drive | The main device that a computer uses to store information. Most computers come with a hard drive, called drive C, located inside the computer case. |     CD-ROM | ROM means Read-Only-Memory - you can only "read" information, not save. A CD can store a large amount of data including documents,  photographs, software, and music (about 20 songs) | | CD Drive | Compact Disk | | CD-R A CD-Recordable drive can put data onto a disk in just one session, and then is "closed" - one "burn" only - you can't add to it after you create it.  | CD-RW A CD-ReWritable drive can be written onto more than once - similar...

Words: 2913 - Pages: 12

Premium Essay

Computer

...(introduction) What is a Computer? B. History of computers C. (thesis) Types of computer 4.1 Supercomputer 4.2 Mainframe 4.3 Workstation 4.4 The Personal Computer or PC 4.5 Microcontroller 4.6 Server D. Hardware & software 5.7 hardware 5.8 software 5.9 firmware E. Basic operations 6.10 input 6.11 output 6.12 processing 6.13 storage F. Names for different sizes of data 7.14 Bit 7.15 Byte 7.16 kB 7.17 MB 7.18 GB 7.19 TB 7.20 PB G. Measurement of data speed 8.21 Mbps 8.22 Gbps H. Purpose of computer 9.23 performing calculations 9.24 storing data 9.25 retrieving data 9.26 processing data INTRODUCTION: WHAT COMPUTER IS? I. What is computer? A computer is a "box" that you put some "stuff" in, the box does "stuff" with it, and then the box has some way of showing the world what it's done. The stuff you put into a computer is called data, and gets into the computer using the input. Data is simply a form of information. You can put data into a computer by your keyboard, a mouse, a trackpad, a camera, an infrared sensor; anything that will give the computer more information about the world around it. Based on what information the computer has gotten, it can decide to do stuff with it. What the computer does with information is known as processing. A computer will process information...

Words: 2841 - Pages: 12

Premium Essay

Computer

...types of computers, the computers are classified according to their functions and capabilities, as: Sample essay analysis ... Types of Computers - College Essay - Scodger - StudyMode.com www.studymode.com › ... › Computers & Internet › Computer Hardware‎ Types of computers. Firstly, what is a computer? Well, a modern computer is typically an electronic or digital device that manipulates data. Computers can ... Types of Computers - Term Papers - Maliktaimurarif www.termpaperwarehouse.com › Computers and Technology‎ May 9, 2012 - Read this essay on Types of Computers . Come browse our large digital warehouse of free sample essays. Get the knowledge you need in ... History of Computers Essay - Custom Writing Service www.customwritings.com/blog/...essays/history-computers-essay.html‎ You can order a custom essay, term paper, research paper, thesis or dissertation on History of Computers topics at our professional custom essay writing service ... Computer Technology Essay - Custom Writing Service www.customwritings.com/blog/...essays/computer-technology-essay.html‎ Free sample essay on Computer Technology: Since the beginning of time ... Computers play a significant role in the school system as well. ... Categories. Essay of computer and its uses - WikiAnswers wiki.answers.com › ... › Categories › Technology › Computers‎ ... Categories > Technology > Computers > Essay of computer and its uses? ... computer is a...

Words: 470 - Pages: 2

Premium Essay

Computers

...Computers Today’s generation could never ever imagine in their wildest dreams about the world, ages before, when there were no computers or any other technologies. So much we have advanced that now every information is just a click away and is in your hands 24/7. All this advancement was possible only with the introduction of a small device called the “Computer”. Basically, computer is a device that accepts the message by the imputer and processes this message and stores the information at the storage devices and later gives an output of the message through the output devices. A simple explanation of the computer. Normally, a computer consists of a processing unit called the Central Processing Unit or the CPU and a form of memory. In the years between 1940 and 1945 were the first electronic digital computers developed. The initial sizes were as big as a room and consumed power as much as today’s personal computers. Initially, computer was related to a person who carries out calculations or computations and as such the word computer was evolved in 1613 and continued till the end of 19thcentury. Later it as re-described as a machine that carries computations. The early computers were limited in their functions. It was the fusion of automatic calculation and programmability that produced the first computers that were recognized in 1837. Charles Babbage in 1837 was the first to introduce and design a fully programmed mechanical computer, his analytical engine. Due to limited finances...

Words: 986 - Pages: 4

Premium Essay

It on Computers

...The computer is the most wonderful gift of science to the modern man. The computer can do all the works of man. Thus, after the invention of computer, the gap between man and machine has been bridged up. The dictionary meaning of the word "Computer" is an electronic calculating machine. It is derived from the word compute which means to reckon. But the function of the computer has expanded beyond the act of reckoning. Though a machine, it contains and provides innumerable information's and artificial intelligence of a very high order. It may seem strange, but it is true that the memory and intelligence of a computer can surpass those of a living human being. The mechanism of the computer is very simple. Information processing is the essence of computing. It is a data based machine. The data is fed into the machine. The machine is manipulated and then the due information is retrieved. Computer was invented due to the pressures of World War-II which witnessed the use of such sophisticated weapons as night bombers, submarines, and long range guns on ships and tanks, etc. The defenders have to fight back by shooting at targets and those targets of the enemy can be located by radar. Radar can inform not only about the location of the enemy but also about the direction and the speed of the enemy weapons. Detailed mathematical calculations are necessary to find out these things accurately. Firing tables are required by the front line soldiers. Thus the necessity of calculations...

Words: 584 - Pages: 3