Free Essay

Fundamentals of Hardware and Software

In:

Submitted By TastinRainbowz
Words 818
Pages 4
SECTION 1
FUNDAMENTALS OF HARDWARE AND SOFTWARE
A computer is an electronic device, operating under the control of instructions stored in its memory.
 Input – accept data
 Processing – manipulate data
 Output – produce results from the processing
 Storage – store the data and results for future use

HARDWARE
Hardware is the physical parts of the computer. There are five main components:
1. Central Processing Unit
2. Primary Storage devices
3. Secondary Storage devices
4. Input Devices
5. Output Devices
1. The Central Processing Unit (CPU) is also known as the processor. It is the brain of the computer and converts data into information. CPU speed is measured in Hertz.
1 hertz = 1 clock cycle/machine instruction per second
1 Kilohertz (KHz) = 1000 Hz
1 Megahertz (MHz) = 1000 KHz = 1 000 000 Hz (1 million)
1 Gigahertz (GHz) = 1000 MHz = 1 000 000 000 Hz (1 billion)
A CPU with speed of 1 GHz can execute 1 billion machine instructions per second.
There are two main parts of the CPU:
A: Control unit – This controls the sequencing of operations of the CPU by fetching and decoding instructions and coordinating the input and output devices.
B: Arithmetic Logic Unit (ALU) – This manipulates the data. It performs arithmetic operations
(including addition, subtraction, division and multiplication and logical operations (including reasoning and performing the comparisons necessary to make decisions).

2. Main Memory/Immediate Access Storage (IMAS)/Primary Storage – This is storage that is directly available to the CPU. It is located directly on the computer's circuit board so that data can travel quickly to and from the
CPU. Two main types of main memory chips are RAM and ROM.
3. Secondary storage–This is needed for the permanent storage of data so that it can be used later. Secondary storage devices include floppy drives, hard drives, CD/DVD drives and tape drives.
4. Input devices – These are devices that accept data and convert it into a form the computer can understand.
5. Output devices – These are devices that display the resulting information in a form the user can understand. PRIMARY STORAGE
Bistable device – This is a device that is stable in only one of two states. Everything the computer does is as a result of turning on and off different combinations of microelectronic switches called transistors (bistable device). The on and off of the transistors are used to represent 0s and 1s that make up the binary number system. These 0s and 1s are known as bits.

Function

Volatility
Access
Length of storage
Content

Random Access Memory (RAM)
Stores data and instructions that are in current use by the CPU.

Read Only Memory (ROM)
Stores data and instructions that are necessary to boot up or restart the computer. It is volatile.
It is non-volatile.
Allows data to be read from and Only allows data to be read from it. written to it.
It stores data temporarily.
It stores data permanently.
Content is determined by the Content is determined by the programs that are currently being manufacturing process. It also contains used. basic input/output instructions.

Random Access Memory (RAM)
 The size of the RAM varies between 128Mb, 256Mb, 512 Mb, 1,024 Mb (1Gb), 2,048 Mb(2Gb), 3,072
Mb(3Gb) etc.
 RAM can be randomly accessed. This means data from any location in RAM can be accessed as needed.  One advantage of RAM is that CPU can access data held in RAM almost immediately.
Volatile means that the data held is lost when the computer is turned off.

Programmable Read Only Memory (PROM)
 This is a type of chip that is manufactured blank and allows data to be written onto it once.
 After a PROM has been programmed, it is dedicated to that data, and it cannot be reprogrammed.
 Because ROMs are cost-effective only when produced in large volumes, PROMs are used during the prototyping stage of the design. New PROMs can be created and discarded as needed until the design is perfected.
Eraseable Programmable Read Only Memory (EPROM)
 This is a type of chip that allows data to be written to it after it has been manufactured.
 The data can then be erased using ultra-violet light and reprogrammed.
 Although EPROMs are more expensive than PROMs, they can be more cost-effective in the long run if many changes are needed.

Units of Storage


Bit - stands for Binary DigIT. A bit is a bistable device - it can either be a 1 or a 0. It is the smallest unit of storage.



Byte - grouping of 8 bytes. It is used to represent one character (a-z, A-Z, 0-255, typographical symbols).
1 kilobyte (KB)
1 megabyte (MB)
1 gigabyte (GB)
1 terabyte (TB)

= 1024 bytes
= 1024 KB
= 1024 MB
= 1024 GB



Word – the amount of data that can be accessed by the CPU from RAM at one time (one cycle).



Word size - the amount of bits in a word.

Similar Documents

Premium Essay

Information Systems

...Name: Professor: Course: Date: Chapter Two Journal Entry: Fundamentals of Information Systems Organizations spend huge chunks of money in computer software and hardware installation to ensure that they increase revenue, cut on costs, increase worker productivity and provide a working customer support. Thus, the persons concerned in identifying and selecting computer hardware and software must recognize the business needs of the organization at present and in future. Firms that do not take advantage of advances in information systems will have a weak competitive advantage (Stair and Reynolds 117). The physical components of a computer perform input, storage, processing and output. Since they make up well performing hardware, they must be carefully selected to suit the murky nature of the technology industry and the evolving business needs. As the computer hardware manufacturers implement green computing designs to conserve the environment, hardware requirements will reduce. Similarly, disposal of products relating to information systems ought to be done carefully. Green computing aims to lessen the use of harmful material, allow companies to cut on power costs and ensure safe disposal of waste products. For instance, in a bid to reduce data-storage facilities, developers created cloud data centers. On the other hand, software is vital to controlling the working of computer hardware. An operating system allows users to interact with the computer through...

Words: 349 - Pages: 2

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Network Security

...CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a firewall does, how it performs these tasks, why firewalls are necessary, the various firewall types, and filtering mechanisms. Once you understand these fundamentals of firewalls, you will be able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefits of effective firewall architecture will become clear. Like any tool, firewalls are useful in solving a variety of problems and in supporting essential network security. Chapter 2 Topics This chapter covers the following topics and concepts: • What a firewall is • Why you need a firewall • How firewalls work and what they do • What the basics of TCP/IP are • What the types of firewalls are • What ingress and egress filtering is • What the types of firewall filtering are • What the difference between software and hardware firewalls is • What dual-homed and triple-homed firewalls are • What the best placement of a firewall is 43 Chapter 2 Goals When you complete...

Words: 15367 - Pages: 62

Free Essay

Instructor

...City, Philippines Date Attended: 2002 – 2005 Awards: Technical Support Award Loyalty Award EMPLOYMENT HISTORY EMPLOYMENT HISTORY Community Service and Extra Curricular Activities Award Company Name: AMA Computer College – Santiago City Campus Position Title: Instructor Specialization: Information Technology – Computer Science Industry: Education Date Employed: June 2013 – to present Duties: Instruct Computer and Infotech. Fundamentals, Cisco Network and Lab. Technician Facilitate Thesis – Systems Analysis and Design Company Name: Artweb Services Inc. Position Title: System Administrator/Web Developer/Graphics Designer Specialization: System Administrator and Web Development Industry: Business Software Solution/Business Software Development Date Employed: October 2011 to October 2012 Duties: Web Development/System Administration Company Name: Reishigo Philippines Inc. Position Title: System Administrator/IT Head Specialization: System Administrator and Development Industry: Sales and Marketing Date Employed: July 2010 to February 2011 Duties:...

Words: 433 - Pages: 2

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Software Engineering Advantages

...1.3 SOFTWARE ENGINEERING DIVERSITY Software engineering takes into account the practical cost, dependability issues, schedule, customers and stakeholder’s needs or expectations (Sommerville, 2016:24). Methods, tools and techniques used to develop software depends on the vendor or organisation developing the software, type of software to be developed and people involved in the development process. The best practice to determine the most suitable software engineering methods, tools and techniques, is to understand the type of application being developed. The following are types of applications: a) Stand-alone applications - these are application systems which operate on a desktop or personal computers or mobile devices. In other words, they...

Words: 1078 - Pages: 5

Free Essay

Computer Fundamentals

...Details of Assessment | Term and Year | | Time allowed | | Assessment Type | Written | Assessment Weighting | 40% | Due Date | Week 5 | Room | | Details of Subject | Qualification | ICA20111Cert II in IT, Digital Media & Technology | Subject Name | Computer Fundamentals | Details of Unit(s) of competency | Unit Code | I ICAICT201A | Unit Title | Use Computer Operating Systems and Hardware | Unit Code | ICASAS206A | Unit Title | Detect and Protect from SPAM and Destructive Software | Details of Student | Student Name | | Student ID | | College | | Student Declaration: I declare that the work submitted is my own, and has not been copied or plagiarised from any person or source. | Signature: ___________________________ Date: _______/________/_______________ | Details of Assessor | Assessor’s Name | | Assessor’s Signature | | Date | | Assessment Outcome | Results | Satisfactory Not Satisfactory | Marks/Grade | | Reasonable Adjustments (if applicable) | | FEEDBACK TO STUDENTProgressive feedback to students, identifying gaps in competency and comments on positive improvements: | ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________...

Words: 1885 - Pages: 8

Premium Essay

The Resume

...PATRICK A. WILBER CHIEF TECHNOLOGY CONSULTANT, QUANSTISSE PO Box 2716 Bellaire, TX 77402 pawilber@quantisse.com 832.429.8667 To: Trading Systems Talent Recruiter Allow me to briefly present what I can offer to you:         An excitement and passion for working with trading systems. 13 years of direct experience in creating and implementing real-time, multithreaded signal processing applications using statistical and numerical calculus algorithms. Experience with designing and implementing trading platform GUI front-ends using .NET Windows Forms and WPF, giving special attention to real-time performance and user friendly presentation. Experience with proprietary and open financial protocols (FIX, XML). Experience with financial business logic, including real-time messaging and sockets, reliable protocols, low latency protocols, distributed calculations, financial modeling, and automated trading algorithms. Experience with artificial intelligent systems for signal analysis and/or parameter optimizations. A high aptitude to rapidly learn and utilize new technologies, mathematics, and business infrastructures. A deep understanding of both technology and business objectives. I can effectively communicate and work with any type of person on any level, whether it is an Executive Manager, IT Professional, or PhD Quant. My long term career goal is to become a top expert in financial trading systems information technologies. Therefore, in the last few years my passion has...

Words: 951 - Pages: 4

Premium Essay

It Appication

...students with the fundamental knowledge of IT. • This course will cover the outline and topics which defined as syllabus of the course and upon successful completion of the course, the main outcome for students will be as below: Understanding the basic terminology of computer and IT Getting familiar with programming language - Exploring some ethical and social issues associated with IT Network and growth of Internet The role of IT in system development stages. Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour ASSESSMENT • Assignment 30% • Class participation 10% • Examinations 60% Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Information Technology Application – IT App. Part I: Computer Hardware Part II: Computer Software Part III: Basic Concepts of Network Part IV: IT and Organization Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Outline of the Course • Fundamentals of Information Technology (IT) • Fundamentals of Computer Hardware – – – – CPU Peripherals Input / Output Memory • • • • • • • • • • Computer Software The Number System Basic Assembly Coding Programming Languages (Overview) Understanding Operating System Networking Fundamentals Internet (Intranet-LAN-WAN-MAN) Information Technology in Organizations System Development Future Computing Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Fundamentals of IT Fundamentals of IT is the first...

Words: 1881 - Pages: 8

Premium Essay

Multilevel Feedback Queue

...Hardware and software share responsibility for managing I/O operations and devices. Why is this hardware support required for this activity? Answer the question in a journal entry The fundamental operation of the operating system (OS) is to abstract the hardware to the programmer and user. The operating system provides generic interfaces to services provided by the underlying hardware. In a world without operating systems, every programmer would need to know the most intimate details of the underlying hardware to get anything to run. Worse still, their programs would not run on other hardware, even if that hardware has only slight differences. Hardware definition-It refers to the physical elements of a computer. This is also sometime called the machinery or the equipment of the computer. Examples of hardware in a computer are the keyboard, the monitor, the mouse and the processing unit. However, most of a computer's hardware cannot be seen; in other words, it is not an external element of the computer, but rather an internal one, surrounded by the computer's casing (tower). A computer's hardware is comprised of many different parts, but perhaps the most important of these is the motherboard. The motherboard is made up of even more parts that power and control the computer Software definition-It refers to all the electronic instructions that tell the hardware how to perform a task. These instructions come from a software developer in the form that will be accepted by the platform...

Words: 630 - Pages: 3

Free Essay

Computer Architectures

...computing and reduced instruction set computing. Technologies in the present and the future depend on these architectures for expedited growth, without them society will halt in technological advances. These computing architectures provide the foundations of computer processing, although each having their specific advantages, disadvantages, pros, and cons. Information technology is rapidly growing, providing users and businesses a means to share digital data. Businesses gear towards investing money in all aspects of information technology systems to provide services for their customers. Users use computers as a means to communicate with family or watch the latest movie over the internet. As more digital data is generated annually, hardware and software manufacturers need to enhance their products (Stair 2010). Computing systems, telecommunications networks and information databases essentially need to keep up with incremental growth of data for the future. A computer simply processes what a user tells it to do, so how does that underlying process really work? Simple, the...

Words: 2285 - Pages: 10

Premium Essay

Live Project

...more of software part in the course whereas Computer Science includes more of computer hardware part like networking, chip level knowledge etc. Although some of the subjects are same in both the streams.  Answer Information Technology is the business side of computers - usually dealing with databases, business, and accounting. The cs engineering degree usually deals with how to build micro processors, how to write a compiler, and is usually more math intensive than IT. One way to think of it is one is dealing with information - data which would be the IT and the other is dealing with the "science" or "how to make it" of computers.   Answer    The exact answer depends heavily on the college or university in question, as each tends to split things slightly differently. As a generalization, there are actually three fields commonly associated with computers:  Information Technology - this sometimes also goes by the names "Information Systems", "Systems Administration", or "Business Systems Information/Administration". This is a practical engineering field, concerned primarily with taking existing hardware and software components and designing a larger system to solve a particular business function. Here you learn about some basic information theory, applied mathematics theory, and things like network topology/design, database design, and the like. IT concerns itself with taking building blocks such as servers, operating systems, network switches, and software applications...

Words: 490 - Pages: 2

Free Essay

Sams Dan

......................................................................................... 4 Virtualization for Server Consolidation and Containment ........................................................... 7 How Virtualization Complements New-Generation Hardware .................................................. 8 Para-virtualization ................................................................................................................................... 8 VMware’s Virtualization Portfolio ........................................................................................................ 9 Glossary ..................................................................................................................................................... 10 2 VMWARE WHITE PAPER Virtualization Overview Introduction Among the leading business challenges confronting CIOs and IT managers today are: cost-effective utilization of IT infrastructure; responsiveness in supporting new business initiatives; and flexibility in adapting to organizational changes. Driving an additional sense of urgency is the continued climate of IT budget constraints and more stringent regulatory requirements. Virtualization is a fundamental technological innovation that allows skilled IT managers to deploy creative solutions to such business challenges. Virtualization in a Nutshell Simply put, virtualization...

Words: 2715 - Pages: 11

Premium Essay

Operating System

...compare to the past 20 years. In this new era of technology, computers and laptops have the most critical outcome in our lives. It is changing the way we connect, communicate, share data and interacts. But most importantly, the Operating System has a huge impact on any type of PC and smartphones. According to (Capron, 2001), “An Operating System is the fundamental software that has the access to control all other software and hardware resources” (p. 65). It has control of every file, processes, session of memory and device. (Nickerson, 2001) stated, “The most centralized system software is the OS. Without it, PCs would be extremely hard to utilize.” (p. 31). It is specially designed to work for different types of computers. For example: desktop computer, laptop, tablet PC, handheld PC, etc. Generally, a personal computer (PC) is all-purpose computer. The size and the capabilities make it convenient for individuals, and which is intended to be operated directly by an end user. The different types of operating systems are, Windows, Linux, Mac OS, etc. and each of them have different versions. These advances in hardware and software technologies have increased demands for more advanced and better operating systems. Now, compatible companies such as Windows and Apple are coming up with newer generations in the OS field which performs more complex tasks compare to their previous generations. Operating systems have evolved through various stages and generations. Looking back into the...

Words: 1560 - Pages: 7

Premium Essay

Human Resource

...effective and profitable. Even if the computer software industry have several competitors, doubtlessly Microsoft is way in front of the market in terms of being the most reputable and intensifying computer software producing firm globally. Microsoft has developed itself into a worldwide empire in the world of computers, Ever since being established by Bill Gates in 1975. Its large resources and qualified staff have allowed the company to generate a large array of products that are able to deal with the different computing needs and activities of its international customers. Microsoft’s reputation worldwide has also become much better over the past couple of years as the firm seeks to separate itself from the rest of the competition and it is still a pioneer in the computer software and hardware industry. With CEO Steve Ballmer managing the day to day functions of the organization, Microsoft has really never looked back and has remained powerful and successful even as the present financial crisis has negatively influenced the operations of its competitors. Experts anticipate that Microsoft will continue to strengthen its dominant place in the computer software and hardware industry in the future as they keep on increasing their profitability and considerable global success. Microsoft’s Organizational Culture and human resource management: During the 1990s, it could be remembered that IBM dominated the world’s computer software and hardware industry, while Microsoft was behind...

Words: 1112 - Pages: 5