Premium Essay

Similarity and Differences Pc/Mainframe

In:

Submitted By jaxtsprntr25
Words 1100
Pages 5
The Similarities and Differences of PC/Mainsframes
Ryan Serrano
University of Phoenix
Introduction to Operating Systems
POS 355
John Stewart
May 05, 2012

The Similarities and Differences of PC/Mainsframes The events leading up to the evolution of technology have driven innovation to a whole new level of affecting society’s constant growth. These new technologies have helped to simplify the work load more than ever before thought. With the advancement of technology have come many milestones both positive and negative. These milestones can be seen economically, culturally, and socially. What began as a large mainframe which filled up rooms of space has evolved into portable devices like smart-phones that can easily be customized to each users preferences. Two avenues in technology to explore are the mainframe and the PC which sets the tone and is the foundation of what technology can bring into the next millennium. Mainframes are a digital computer that is designed for high speed data processing through the heavy use of input/output units such as large capacity disks and printers. The industrial era relied heavily on manpower to satisfy consumer needs. But as time wore on the consumer demand became so great that the use of mainframes was necessary to simplify and meet consumer demands. In addition, what would take months or even years to produce could easily be completed in weeks or a few days with mainframes. They have even been used for such applications as payroll computations, accounting, business transactions, information retrieval, airline reservations, and scientific engineering which involve complex computations. From the mainframes, came the birth of the personal computer and its introduction to the mass market. The personal computer is a digital computer designed for use by only one person. A typical personal computer consists of a

Similar Documents

Premium Essay

Compare and Contrast Pcs and Mainframes

...Contrast PC's and Mainframes Lowell J. Head POS/355 July 16, 2012 Wendy Lamont Compare and Contrast PC's and Mainframes Introduction Personal Computers (PC’s) and Mainframes have come a long way since their starts many years ago. The PC’s roots began with the mainframe. Access to the mainframe was done through a small terminal known as a dumb terminal; the dumb terminal provided no processing, only video and a keyboard. This led to trying to take some of the load from the mainframe and put it at the terminal. Thus, the PC was born. A mainframe computer is a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. A PC is only expected to support a single user at a time and focus all of its processing power towards that user’s needs. There are many types of computers that could be called PC’s: Workstation, tower, desktop, notebook, or tablet. Compare The PC and the mainframe are very similar in what hardware is needed to operate. Each has a motherboard, processor, bus, memory, storage, operating system(s), and a display. The PC and the mainframe can both be programmed to manipulate data and it can execute a program and store and retrieve data. They respond to instructions as defined by the operating system. Contrast The operating system is one of the main differences between PC’s and mainframes. The mainframe’s operating system is very complex, more so than the PC. The size of the mainframe is probably the most...

Words: 483 - Pages: 2

Free Essay

Operating Systems

...Operating Systems: Open or Closed Source Donald C. Dodd POS 355 06/09/2014 Dr. Bruce Huang Operating Systems: Open or Closed Source One of the biggest questions when choosing an operating system is whether it is free or not. Let’s face it cost face it cost is always going to be part of a deciding factor when it comes to making a decision in business. And free always sounds good but usual comes with some type of string attached. In this paper I will discuss what are open and closed source operating systems (better known as OS) and how they differ. As well I will discuss some of what you can expect and what not to expect from open and closed operating systems. And lastly I will give examples of each a closed and open OS. OS is often confused with things like word and excel but those are really applications that run within an OS. These applications are members of the Microsoft Office suite that is compatible with the Windows OS. The windows OS is an example of a closed operating system. What is a closed OS? A closed OS is an OS that the source code is kept private. Closed OS’s are typically made by one company and only the final product is made public. (You will see beta versions but typically these are close to final products). With closed OS’s you need to by licensing to make it work, without a valid license the OS may become inoperable thus rendering your computer useless when the companies “trail” period ends (usual within 30 days of installation). After purchasing...

Words: 585 - Pages: 3

Premium Essay

Evolution of Computers

...CHAPTER 1: INTRODUCTION In the beginning of civilization, people used fingers and pebbles for computing purposes. In fact, the word 'digit us' in Latin actually means 'finger' and 'calculus' means 'pebble'. This gives a clue into the origin of early computing concepts. With the growth of civilization, the computing needs also grew. The need for a mechanism to perform lengthy calculations led to the invention of the first calculator and then the computers. The term 'computer' is derived from the word 'compute', which means to calculate. A computer is an electronic machine, devised for performing calculations and controlling operations that can be expressed either in logical or numerical terms. In simple words, a computer is an electronic device that performs mathematical and non-mathematical operations with the help of instructions to process the data to achieve desired results. Although the application domain of a computer depends totally on human creativity and imagination, it covers a huge area of applications including education, industries, government, medicine, scientific research, law and even music and arts. This chapter provides a detailed description of evolution, generations and characteristics of computers along with their classification and applications. CHAPTER 2: CHARACTERISTICS OF COMPUTERS Man developed computers so that it could perform intricate operations such as calculation and data processing or entertain him. Today, computers are everywhere—in...

Words: 9431 - Pages: 38

Premium Essay

Case: Dell Inc.: Improving the Flexibility of the Desktop Pc Supply Chain

...Case: Dell Inc.: Improving the Flexibility of the Desktop PC Supply Chain It was June 2005, seemingly a good time for Dell Inc. Since the dot-com bubble burst in 2001, the price of the company’s stock had roughly doubled. Both the company’s revenue and net income were reaching new heights. In spite of the confidence and optimism, however, Dell’s desktop PC manufacturing division found that its manufacturing costs had continued to surge. Tom Wilson, one of the division’s directors, revealed: “The recent increase in Level 5 manufacturing is alarming to us at Dell. From Dell’s perspective, this adds cost to our overall manufacturing process. We are not able to take as much advantage as we should of the lower cost structure of our contract manufacturers. Instead, we have to rely more heavily on the 3rd-party integrators (3PIs). Not only do we get lower-quality products because we currently don’t require 3PIs to perform integration unit testing, we also have difficulty forecasting for the 3PIs how much manufacturing capacity they should have available to support Dell’s demand.” History of the PC Industry In the 1960s, the first so-called personal computers (PCs)—non-mainframe computers—such as the LINC and the PDP-8 became available. They were expensive (around $50,000) and bulky (many were about the size of a refrigerator). However, they were called “personal computers” because they were small and cheap enough for individual laboratories and research projects. These computers also...

Words: 3670 - Pages: 15

Premium Essay

Java and Java Script

...ava and JavaScript are languages that evolved because of the Internet. From the evolution of mainframes, to stand-alone PCs, to networked communication, and lastly to the Internet, one thing has been a constant, different languages evolved based on a need. For these two languages, the Internet was a perfect fit, and without them the Internet would be a less dynamic and vibrant highway. As the Internet grew, more and more people found it a more viable place to do business. With that came a need for languages that were fairly easy to learn, dynamic, secure, portable, and maintainable. The industry answered that call with languages such as Java and JavaScript. This paper will perform an analysis of both Java and JavaScript. In order for the reader to gain a better understanding of these languages, the history of these languages with overviews will be presented along with a discussion of the benefits and drawbacks. The History of Java In the middle of May 1995 Java was introduced into the world, and along with Netscape it would be the new way for Internet users to access this new information superhighway. But before it got to this point, Java technology was developed almost by accident. Back in 1991, Sun Microsystems was looking into the future in anticipation of the future of computing, and they tasked a team that became know as the “Green Project”. Their main focus was to come up with a plan for the future of computing, but what they came out with was something quite unexpected...

Words: 1329 - Pages: 6

Premium Essay

Computer Literacy

...noter Introduction to Computer The word computer is derived from the Greek work “compute” which means to calculate and it is a device that can perform arithmetic operations and take logical decisions. Computer is an electronic device; used to convert Data into Information, it takes input (data) through input devices process it into CPU, stores it and also displays the result through output devices. A computer is a programmable machine. The two principal characteristics of a computer are; it responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list of instructions (a program). Modern computers are electronic and digital. CPU The actual machinery; wires, transistors, and circuits are called hardware while the instructions and Data are called software. All the general-purpose computers require the following hardware components: Central processing unit (CPU) The “heart” or “Brain” of the computer, the component that actually executes instructions is known as CPU or Central Processing Unit. Memory It is also known as main memory, primary memory or simply RAM (random access memory). It is volatile type of memory. It enables a computer to store data and programs temporarily. Input devices Devices used to input the data and instructions into the computer system. Usually a keyboard and mouse are used as input devices. Output devices Devices used to...

Words: 10903 - Pages: 44

Premium Essay

Database

...rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2861-2 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com Preface In recent years there have been significant advances in the development of high performance personal computer and networks. There is now an identifiable trend in industry toward downsizing that is replacing expensive mainframe computers with more cost-effective networks of personal computer that achieve the same or even better results. This trend has given rise to the architecture of the Client/Server Computing. The term Client/Server was first used in the 1980s in reference to personal computers on a network. The actual Client/Server model started gaining acceptance in the late 1980s. The term Client/Server is used to describe a computing model for the development of computerized systems. This model is based on the distribution of functions between two types of independent and autonomous entities: Server and Client. A Client is any process that request specific services from server processes. A Server is process that provides requested services for Clients....

Words: 79055 - Pages: 317

Premium Essay

Competition Rivalry

...*** NOT MY ORIGINAL WORK ******* IT IS A COPY FOUND ON INTERNET KNOWLEDGE OBJECTIVES 1. Define competitors, competitive rivalry, competitive behavior, and competitive dynamics. 2. Describe market commonality and resource similarity as the building blocks of a competitor analysis. 3. Explain awareness, motivation, and ability as drivers of competitive behavior. 4. Discuss factors affecting the likelihood a competitor will take competitive actions. 5. Discuss factors affecting the likelihood a competitor will respond to actions taken against it. 6. Explain competitive dynamics in slow-cycle, fast-cycle and standard-cycle markets. CHAPTER OUTLINE Opening Case Competition Between Hewlett-Packard and Dell: The Battle Rages On A MODEL OF COMPETITIVE RIVALRY COMPETITOR ANALYSIS Market Commonality Resource Similarity DRIVERS OF COMPETITIVE ACTIONS AND RESPONSES Strategic Focus Who Will Win the Competitive Battles Between Netflix and Blockbuster? COMPETITIVE RIVALRY Strategic and Tactical Actions Strategic Focus Using Aggressive Pricing as a Tactical Action at Wal-Mart LIKELIHOOD OF ATTACK First-Mover Incentives Organizational Size Quality LIKELIHOOD OF RESPONSE Type of Competitive Action Actor’s Reputation Dependence on the Market Popped the Top? COMPETITIVE DYNAMICS Slow-Cycle Markets Fast-Cycle Markets Standard-Cycle Markets SUMMARY REVIEW QUESTIONS EXPERIENTIAL EXERCISES NOTES LECTURE NOTES Chapter Introduction:...

Words: 11328 - Pages: 46

Premium Essay

Security

...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 93588 - Pages: 375

Premium Essay

The Handbook

...National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made...

Words: 93564 - Pages: 375

Premium Essay

Ehr in Home Health

...Wisconsin – Milwaukee HCA: 700 Abstract The purpose of this paper is to examine the electronic health record (EHR) and electronic medical record (EMR) in the home health setting in the United States. “EHR” and “EMR” are often used interchangeably. However, this paper will discuss the differences between an EHR and an EMR. It will cover the benefits and disadvantages of the EMR in the home health setting. This paper will also cover the potential costs associated with the use of the EMR in the home health setting. Finally, the paper will discuss the Technology Acceptance Model (TAM) of an EMR in home health. Outline I. Introduction a. Purpose b. Explanation of terms II. Background a. Home Health Care i. What is it ii. History iii. How it is changing b. Health Informatics in Home Healthcare i. History of informatics in HHC ii. Current use of informatics in HHC iii. Benefits of informatics in HHC III. Comparison of EMR/EHR a. Definitions b. Settings used c. Differences d. Similarities IV. Implementation of the EMR in Home Health a. Feasibility b. Cost c. Equipment d. Staff Acceptance V. Conclusion a. Summary of benefits/disadvantages b. Cost c. Implementation d. Recommendation...

Words: 4413 - Pages: 18

Premium Essay

Application.Servers.for.E-Business

...Application Servers for E-Business Table of Contents Application Servers for E-Business - 2 Preface - 4 Chapter 1 - Introduction - 5 Chapter 2 - A Survey of Web Technologies - 22 Chapter 3 - Java - 44 Chapter 4 - CORBA - 65 Chapter 5 - Application Servers - 82 Chapter 6 - Design Issues for Enterprise Deployment of Application Servers - 114 Chapter 7 - Tying It All Together - 137 References - 160 For More Information - 163 page 1 Application Servers for E-Business Application Servers for E-Business Lisa M. Lindgren Auerbach Library of Congress Cataloging-in-Publication Data Lindgren, Lisa. Application servers for e-business / Lisa M. Lindgren. p.cm. Includes bibliographical references and index. ISBN 0-8493-0827-5 (alk. paper) 1. Electronic commerce. 2. Application software—Development. I. Title. HF5548.32 .L557 2001 658′.0553–dc21 00-050245 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system,...

Words: 98260 - Pages: 394

Premium Essay

Technology Hardware, Storage & Peripherals

...Powered by S&P Capital IQ INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals April 2015 ANGELO ZINO, CFA Equity Analyst www.spcapitaliq.com 2 April 2015 INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals PERFORMANCE Sector Overview Industry Overview Revenues Expenses Profits & Margins Valuation Capital Markets INDUSTRY PROFILE Trends INQUIRIES & CLIENT SUPPORT 800.523.4534 clientsupport@standardandpoors.com SALES 877.219.1247 wealth@spcapitaliq.com Key Ratios And Statistics CONTACTS How The Industry Operates How To Analyze This Industry Glossary Industry References Comparative Company Analysis MEDIA Michael Privitera 212.438.6679 michael.privitera@spcapitaliq.com S&P CAPITAL IQ 55 Water Street New York, NY 10041 All of the views expressed in these research reports accurately reflect the research analyst’s personal views regarding any and all of the subject securitiesor issuers. No part of the analyst’s compensation was, is, or will be, directly or indirectly, related to the specific recommendations or views expressed in this research report. For important regulatory information, go to www.standardandpoors.com and click on Regulatory Affairs and Disclaimers. Copyright © 2015 Standard & Poor’s Financial Services LLC, a part of McGraw-Hill Financial. All rights reserved. 3 April 2015 INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals ...

Words: 29719 - Pages: 119

Premium Essay

Directions for Web and E-Commerce Application Security

...National Instituate of Technology,Rourkela Department of Computer Science and Engineering Term Paper on Directions for Web and E-Commerce Applications Security SupervisorProf.P.M. Khilar Submitted byDinesh Shende Roll No-212CS2102 M.Tech(1st year) Directions for Web and E-Commerce Applications Security Abstract: This paper provides directions for web and e-commerce applications security. In particular, access control policies, workflow security, XML security and federated database security issues pertaining to the web and e-commerce applications are discussed. These security measures must be implemented so that they do not inhibit or dissuade the intended e-commerce operation. This paper will discuss pertinent network and computer security issues and will present some of the threats to e-commerce and customer privacy. These threats originate from both hackers as well as the e-commerce site itself. Another threat may originate at ostensibly friendly companies such as DoubleClick, MemberWorks and similar firms that collect customer information and route it to other firms. Much of this transaction information is able to be associated with a specific person making these seemingly friendly actions potential threats to consumer privacy. Many of the issues and countermeasure discussed here come from experiences derived with consulting with clients on how to maintain secure e-commerce facilities. These methods and techniques can be useful in a variety of client and server...

Words: 3283 - Pages: 14

Premium Essay

Managing Information Technology (7th Edition)

...CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 ...

Words: 239887 - Pages: 960