Premium Essay

Term Paper on Computing Fundamental

In:

Submitted By mishuhappyguy
Words 8668
Pages 35
INTRODUCTION

A. Origin of the report:

This report on “Features, Advantages, Disadvantages and Price of Desktop Computer, Laptop Computer, Palmtop Computer, PDA and Mobile Phone” is submitted to Tahmina Khanam, course teacher of the course MGT 308 “Computing Fundamental” on July 02, 2009. The information of the report has been conducted under the direction of Lecturer Tahmina Khanam.

B. Purposes:

To find out the different features of different types of computer and latest technology and their advantages, disadvantages and prices.

C. Scope of the study

The frontier of the report is that it only discusses about desktop computer, laptop computer, palmtop computer, PDA and mobile phone. We have known a lot of things through the internet.

D. The Limitations of the study

The report has some limitations. The websites did not provide clear information about a lot of topics. Everything in there is very complicated.

E. Methodology

There are two types of method by which we have collected all the data and information. The first method is that we went to computer sales centre to know about the computers features and prices. The second is that we searched the internet for further information. The data and other analysis those have been done in this report are on the basis of the course “MGT-308 – Computing Fundamental”.

F. Report Preview

We discuss one by one the types of the computer. And we also include features, advantages, disadvantages and price with explanation. We make all the parts as clear as possible.

TEXT OF THE REPORT Computer, machine that performs tasks, such as calculations or electronic communication, under the control of a set of instructions called a program.
Different types of computers are existed in this world. They are desktop, laptop, palmtop and PDA.
We will discuss about all the devices here.
Desktop

Similar Documents

Premium Essay

Pert

...Computer science From Wikipedia, the free encyclopedia Jump to: navigation, search Computer science or computing science (abbreviated CS) is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems.[1][2] Computer scientists invent algorithmic processes that create, describe, and transform information and formulate suitable abstractions to model complex systems. Computer science has many sub-fields; some, such as computational complexity theory, study the fundamental properties of computational problems, while others, such as computer graphics, emphasize the computation of specific results. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describe computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to humans. The general public sometimes confuses computer science with careers that deal with computers (such as information technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement...

Words: 5655 - Pages: 23

Premium Essay

The Fluidity of Computer Science

...The Fluidity of Computer Science. Gender Norms & Racial Bias in the Study of the Modern "Computer Science" Computer science or computing science designates the scientific and mathematical approach in computing. A computer scientist is a scientist who specialises in the theory of computation and the design of computers. Its subfields can be divided into practical techniques for its implementation and application in computer systems and purely theoretical areas. Some, such as computational complexity theory, which studies fundamental properties of computational problems, are highly abstract, while others, such as computer graphics, emphasize real-world applications. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to description of computations, while the study of computer programming itself investigates various aspects of the use of programming languages and complex systems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to humans. Computer science deals with the theoretical foundations of information, computation, and with practical techniques for their implementation and application. History The earliest foundations of what would become computer science predate the invention of the modern digital computer. Machines for calculating fixed numerical tasks such as the abacus have existed since antiquity...

Words: 2298 - Pages: 10

Premium Essay

Cloud Computing

...Cloud computing A collection of working papers Thomas B Winans John Seely Brown Cloud Computing frequently is taken to be a term that simply renames common technologies and techniques that we have come to know in IT. It may be interpreted to mean data center hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that permit near realtime, policy-based control of computing resources. Or it may be interpreted to mean only data center hosting rather than understood to be the significant shift in Internet application architecture that it is. Perhaps it is the name. Certainly it is more nebulous than mnemonic, if you’ll pardon the poor pun. We happen to think so too. We’d rather use the term service grid, frankly, but that name also has its problems. The fact is that cloud and service grid computing are paradigmatically different from their common interpretations, and their use can shed light on how internet architectures are constructed and managed. Cloud computing represents a different way to architect and remotely manage computing resources. One has only to establish an account with Microsoft or Amazon or Google to begin building and deploying application systems into a cloud. These systems can be, but certainly are not restricted to being, simplistic. They can be web applications that require only http services. They might require a relational database. They might require web service infrastructure and message queues...

Words: 20471 - Pages: 82

Premium Essay

Macroeconomics

...Fundamentals of Macroeconomics Paper ECO/372 June 9th 2014 Professor Salazar Fundamentals of Macroeconomics The global economy is a concept important to understand and mastering this concept is successful by analyzing the term macroeconomics. Macroeconomics a term that illustrates the economy as a whole by describing economics aspects in different countries around the World as opposed to microeconomics which contemplates countries in a singular fashion. The following paper speaks to terms surrounding macroeconomics and consumer economic issues like unemployment, inflation, and interest rates. The Gross Domestic Product or GDP measures a societies manufacturing activities in a one year period. Two aspects of GDP are Real GDP and Nominal GDP and understanding the differences between the two is vital to computing Gross Domestic Product. Real GDP expresses how inflation effects the dollar value of a product of service each year and a reference for this change is the consumer price index. Nominal GDP however are not adjusted for inflation and will at times expresses bigger numbers than Real GDP. The unemployment rate expresses the percentage of people in different countries that either do not have a job or practice other means of obtaining currency. In addition, unemployment is directly affected by inflation another concept surrounding the fundamentals of macroeconomics. Inflation is the how much the price of a product of service increases in the economy. “Inflation...

Words: 648 - Pages: 3

Premium Essay

Cloud Computing

...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several years...

Words: 5878 - Pages: 24

Premium Essay

Thesis

...GAME THEORY Game theory has found its applications in numerous fields such as Economics, Social Science, Political Science, and Evolutionary Biology. Game theory is now finding its applications in computer science. The nature of computing is changing because of success of Internet and the revolution in Information technology. The advancement in technologies have made it possible to commoditize the components such as network, computing, storage and software. In the new paradigm, there are multiple entities (hardware, software agents, protocols etc.) that work on behalf of different autonomous bodies (such as a user, a business etc.) and provide services to other similar entities. Internet has made is possible for many such geographically distributed antonymous entities to interact with each other and provide various services. These entities will work for their respective owners to achieve their individual goals (maximize their individual payoffs), as opposed to obtaining a system optima (that is socially desirable). This results in an entirely different paradigm of computing where the "work" is performed in a completely distributed/decentralized fashion by different entities where the primary objective of each entity is to maximize the objective of its owner. Therefore, it is important to study traditional computer science concepts such as algorithm design, protocols, and performance optimization under a game-theoretic model.  This course aims to provide a basic understanding...

Words: 2068 - Pages: 9

Premium Essay

Don't Know

...Cloud computing: benefits, risks and recommendations for information security Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn1. The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 2. The key conclusion of ENISA’s 2009 paper on Cloud Computing: benefits, risks and recommendations for information security3 is that the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost-effective. ENISA’s paper allows an informed assessment of the security risks and benefits of using cloud computing - providing security guidance for potential and existing users of cloud computing. The new economic model has also driven technical change in terms of: Scale: commoditisation and the drive towards economic efficiency have led to massive concentrations of the hardware resources required to provide...

Words: 2434 - Pages: 10

Free Essay

Internet of Things

...the era of computing will be outside the realm of the traditional desktop. In the Internet of Things (IoT) paradigm, many of the objects that surround us will be on the network in one form or another. Radio Frequency IDentification (RFID) and sensor network technologies will rise to meet this new challenge, in which information and communication systems are invisibly embedded in the environment around us. This results in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless, efficient, and easily interpretable form. This model will consist of services that are commodities and delivered in a manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility computing which integrates monitoring devices, storage devices, analytics tools, visualization platforms and client delivery. The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users to access applications on demand from anywhere. Smart connectivity with existing networks and context-aware computation using network resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE wireless Internet access, the evolution towards ubiquitous information and communication networks is already evident. However, for the Internet of Things vision to successfully emerge, the computing paradigm will need to go beyond traditional mobile computing scenarios...

Words: 858 - Pages: 4

Premium Essay

Cloud Computing Metrics

...2478/v10313-012-0013-8 2012 /15 Cloud Computing Evaluation Based on Financial Metrics Maksims Kornevs1, Vineta Minkevica2, 1-2Riga Technical University, Marcus Holm, Cisco Systems Abstract – Interest in cloud computing is growing, and, as a result, there is much information about it – both positive and negative. On the one hand, cloud computing saves money because it does not require IT infrastructure, servers, and it is very scalable. On the other hand, it might lead to financial loss due to security risks, possible data access problems, data privacy policies, etc. Therefore, cloud computing evaluation based on financial metrics is proposed in this article. This paper consists of four major sections. The first section is a literature review of cloud computing and its types. The next section describes some common financial metrics such as CBA, ROI and TCO and describes how they might be applied to evaluate cloud computing. The third section proposes evaluation strategies, and the last section contains the evaluation of a series of cloud computing projects based on chosen evaluation strategies, and results are verified based on expert opinion. Keywords – cloud computing, CBA, ROI, TCO, ROC computing as “a model for enabling convenient, on-demand network access to a shared pool of configuration computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction” [11] or in simple terms – “low cost flexible entry and exit”...

Words: 4831 - Pages: 20

Free Essay

Eigen Value Eigen Vectors

... Subject:- Mathematics Subject Code:- MTH-217 Course Code:- CE-107 Teacher Incharge:- Ms. Archana Prasad 2 Contents 1. Abstract 3 2. Introduction 3-4 3. Eigenvectors and Eigenvalues of a real matrix 4 a. Characteristic Polynomial 7-8 b. Algebraic Multiplicities 8-9 4. Calculation 9 a. Computing Eigenvalues 9 b. Computing Eigen Vectors 10 5. Applications 10 a. Geology and Glaciology 10-11 b. Vibration Analysis 11-12 c. Tensor of Moment of Inertia 12 d. Stress Tensor 12 e. Basic Reproduction Number. 12 6. Conclusion ...

Words: 4837 - Pages: 20

Premium Essay

Docs

...feasibility and performance of the proposed solution through a software prototype. Moreover, we propose an original cost model that is oriented to the evaluation of cloud database services in plain and encrypted instances and that takes into account the variability of cloud prices and tenant workloads during a medium-term period. KEYWORDS: Cloud database, confidentiality, encryption, adaptivity, cost model. LIST OF CONTENTS Page No List of Figures viii List of Tables ix 1. Introduction 1.1 Purpose 1.2 Scope 1.3 Motivation 1.3.1 Definitions 1.3.2 Abbreviations 1.3.3 Model Diagrams 1.4 Overview 2. Literature Survey 2.1 Introduction 2.2 History 2.3 Purpose 2.4 Requirements 2.5 Technology Used 2.6 Research Methodologies 3. Fundamental Concepts on (Domain) 3.1 Domain Fundamentals & Description 3.1 Existing concepts of fundamentals 3.2 Existing System Algorithms 3.3 Proposed System Fundamentals concepts 3.4 Proposed Algorithms 3.5 Performance analysis in between of existing system...

Words: 17343 - Pages: 70

Premium Essay

Cloud Computing

...Cloud Computing overview advantage and challenges Overview Silver Lining or storm ahead The future of cloud computing Effective use of cloud computing in education institutions Cloud Computing for beginner Cloud computing Challenges and future directions http://www.businesswire.com/news/home/20110622006602/en/Future-Cloud-Computing-Survey-Reveals-Drivers-Cloud Cloud Computing GAP Task Force http://inews.berkeley.edu/articles/Spring2009/cloud-computing Table of contents 2 0 Relevant Resources 4 0 Relevant Resources 4 1 General guidelines of community design 6 2 Attracting new members 7 2.1 Methods of persuasion of a potential user 7 2.2 Encouraging users to invite friends 8 2.3 Entry barrier 9 2.4 Guidance for new members 9 3 Structure of the community 12 3.1 Member profiles 12 3.2 Member connections 13 3.3 Adding connections 15 3.4 Member reputation 16 3.5 Paid membership 18 3.6 Fake members 18 3.7 Lurkers 18 4 Encouraging user participation 20 4.1 Using uniqueness 20 4.2 Using controversy 20 4.3 Using individual recognition 21 4.4 By discouraging low quality contributions (moderation) 21 4.5 Using goal setting 23 4.6 Using E-Mail notifications 24 4.7 By showing the activity of community 24 5 Stimulating Social Interactions 26 5.1 By common Interests 26 5.3 By common current life transitions 27 5.4 By shared experience 28 5.5 By shared education 29 5.6 By showing the distance 29 5.7 By service: Photo Albums 30 5.8 By service: Profile...

Words: 10086 - Pages: 41

Premium Essay

Cloud Computing

...RESEARCH REPORT Title : “What is Cloud computing?” NAME : Pyae Phyo LECTURER : Ms. Dimple Chugani DUE DATE : 30th May 2014 I. LETTER OF TRANSMITTAL TO ACCOMPANY REPORT ASSESSMENT Pyae Phyo Ang Mo Kio Ave-10, Blk-401 23-601#, Singapore,560401 Ms. Dimple Chugani PSB Academy 355 Jalan Bukit Ho Swee Singapore 169567 30 May 2014 RE: ENGLISH REPORT (What is Cloud computing?) Dear Ms. Dimple Chugani, Please find enclosed my report entitled “ What is Cloud computing?”. I trust you will find the report has covered the question in a comprehensive fashion. Should there be any questions regarding the report, please do not hesitate to contuse me at the address above . I will also include my email address, so that initial contact can be made and further arrangements made should that be necessary. I hope that you will find the report covers the areas of concern expressed in the question and that you find it interesting and informative. Yours faithfully, Pyae Phyo Table of Contents Page i. Abstract 4 ii. Justification 5 1. Introduction 6 2. What is Cloud computing? 7 3. Characteristics 8-9 4. Cloud computing Infrastructure Models 4.1 Service Model 4.1.1 Infrastructure as a Service (IaaS) 10 4.1.2 Platform as a Service (PaaS) ...

Words: 3381 - Pages: 14

Free Essay

Steganography: a Review of Information Security Research and Development in Muslim World

...widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5, 6]. Steganography combined with encryption will be a powerful and efficient tool that provides high level of security [7]. A review on steganography research and development throughout the year will be discussed in part 2 of this paper. The review will be focusing on...

Words: 3746 - Pages: 15

Premium Essay

Cloud Computing

...overview advantage and challenges Overview Silver Lining or storm ahead The future of cloud computing Effective use of cloud computing in education institutions Cloud Computing for beginner Cloud computing Challenges and future directions http://www.businesswire.com/news/home/20110622006602/en/Future-Cloud-Computing-Survey-Reveals-Drivers-Cloud Cloud Computing GAP Task Force http://inews.berkeley.edu/articles/Spring2009/cloud-computing Table of contents 2 0 Relevant Resources 4 0 Relevant Resources 4 1 General guidelines of community design 6 2 Attracting new members 7 2.1 Methods of persuasion of a potential user 7 2.2 Encouraging users to invite friends 8 2.3 Entry barrier 9 2.4 Guidance for new members 9 3 Structure of the community 12 3.1 Member profiles 12 3.2 Member connections 13 3.3 Adding connections 15 3.4 Member reputation 16 3.5 Paid membership 18 3.6 Fake members 18 3.7 Lurkers 18 4 Encouraging user participation 20 4.1 Using uniqueness 20 4.2 Using controversy 20 4.3 Using individual recognition 21 4.4 By discouraging low quality contributions (moderation) 21 4.5 Using goal setting 23 4.6 Using E-Mail notifications 24 4.7 By showing the activity of community 24 5 Stimulating Social Interactions 26 5.1 By common Interests 26 5.3 By common current life transitions 27 5.4 By shared experience 28 5.5 By shared education 29 5.6 By showing the distance 29 5.7 By service: Photo Albums 30 5.8 By service: Profile watching 30 ...

Words: 10084 - Pages: 41