This website uses cookies to ensure you have the best experience. Learn more

Computer Hardware For Information Technology & Computer Science Information Technology Level 2 Code

847 words - 4 pages

FIVE MAJOR COMPUTER COMPONENTS
1. MOTHERBOARD
2. CPU(CENTRAL PROCESSING UNITS)
3. POWER SUPPLY UNIT
4. RAM(RANDOM ACCESS MEMORY)
5. HARD DRIVE
1. MOTHERBOARD
CLASSIFICATION OR TYPE
· Hardware
· Integrated and non-integrated
FUNCTION
· The basic function for which a motherboard is used in a computer is that it holds the important electronic components of the system including the memory and central processing unit and helps in establishing some sort of bridged connection between other internal components.
SPECIFICATION
· Motherboard is one of the most essential part of a computer systems. It holds together many of the crucial components of a computer including CPU.
PREVENTATION MEASURE
· When you remove the motherboard from the anti-static bag, do not place it on top of the bag. The exterior of the bag attracts static charges. Ground yourself before handling the motherboard if possible wear an anti-static band.
2. CENTRAL PROCESSING UNIT
CLASSIFICATION OR TYPE
· Hardware
· Intel Pentium gold G5600
FUNCTION OF CPU
· All major calculations and comparisons are made inside the CPU and the CPU is also responsible for activating and controlling the operations of other units of a computer system.
SPECIFICATION
· The CPU is the brain of the computer system. Its carries out the instructions of a computer program, to perform the basic arithmetical, logical and input/output operations of the system.
PREVENTATIVE MEASURES
· Save the processor protection plastic plate that you remove when installing the processor
3. POWER SUPPLY UNIT
CLASSIFICATION OR TYPE
· Hardware
· Unique high quality 500w ATX
FUNCTION OF A POWER SUPPLY UNIT
· It converts the alternating current(AC) into a continuous form of power that the computer components needs in order to run normally called direct current
· It also regulates overheating by controlling voltage which may change automatically or manually depending on the power supply.
SPECIFICATION
· Power supply is the piece of hardware that is used to convert the power provided from the outlet into usable power to many parts inside an electrical device, every energy must drive its load which is connected to it.
PREVENTATIVE MEASURES
· Use the wire size that suits the rated output current of the power supply to be used in order to prevent smoking or ignition caused by abnormal loads
· Caution is particularly required if the output current from one power supply is distributed to multiple loads.
4. RAM(RANDOM ACCESS MEMORY)
CLASSIFICATION AND TYPE
· Hardware
· 8GB DDR3
FUNCTION OF RAM
· A computer...

Other Essays On computer hardware for information technology & computer science - Information technology level 2 - code

final exam assignment information technology - University of potomac - Assignment

1651 words - 7 pages recognized by this code. AES encryption calculation in CFB mode is utilized for picture encryption. AES information encryption is an all the more scientifically proficient and rich cryptographic calculation, yet its fundamental quality rests in the choice for different key lengths. AES enables you to pick a 128-piece, 192-piece or 256-piece key, making it exponentially more grounded than the 56-bit key of DES. As far as structure, DES utilizes the

information technology management - create a hypothetical business - project

696 words - 3 pages Information Technology Management (ITM 211) Guidelines for the group project The purpose of this project is to test the students’ understanding of the material covered in ITM 211. Hence, students are asked to show how the material and concepts discussed in this course relate and can be applied in a practical manner and real life situations. As such, each group will be required to develop a hypothetical business and incorporate all applicable

Information Technology Example Phase - Henny Moore IT - Assignment

961 words - 4 pages Information Technology Practical Assessment Task Grade 11 2017 Phase 2: Design Brandon Coetzee Grade 11M1 Basic Solution Design IPO Table Component Input Processing Output cbbUser sUserType If sUserType = sPassword Display frmGuest/frAdmin cbbEvents sEventName sEventName = cbbEvents.getIndex sEventName, lblSelectedEvent edtTeamName edtScore sTeamName iScore arrTeams[sTeamName.ID] = iScore memScores sedChickenBurgers iQuantityChickBurgers rPrice

Information Technology: An Important And Successful Tool In Business Process Management Pro Gramme

2322 words - 10 pages (BPM) and Information Technology (IT)Similar to the concept of TQM, BPM recognises the constant change of environment and advocates continuous improvement to enhance customer satisfaction. On the other hand, in contrast to the incremental improvement typified by TQM, BPM is characterised by dramatic improvements in reducing costs and enhancing competitiveness. It calls for exploiting the power of modern information technology to radically

Digital Technology: Advantages and Disadvantages - Science and Technology - Essay

725 words - 3 pages age where we use technology on a daily basis and this has transformed the way we interact, socialize, learn, do business and entertain ourselves. Our lives are made easier and information is at our finger tips, but, there too is a dark side to the comforts and simplicity digital technologies bring. With the advent of social media platforms like Facebook or Instagram and the boom in the smart phone industry, people are more connected than ever

Dynamic Programming for Contests - Computer Science - Guide

1981 words - 8 pages an lot of nice symmetry we can use to compress it, like in row-by-row. In these cases, you will want to think a lot about how to express your state in fewer variables. The “sliding-window” trick is one example of this state space reduction and should be at the top of your mind when 2 encountering these large state problems. Rotating arrays can also be useful for this. If the state space just absolutely too large for memory even after you’ve

Producing Robust Programs In Computer Science - Computing - Assignment

1852 words - 8 pages ? Give an example. Version 1 1 © OCR 2017 2. a. Why is it important that a business has robust validation on their registration web page? b. What are two examples of validation that a business can implement on their registration page? 3. The program below outputs the correct size of football for a certain age using the information from the table. The program should also output the circumference and weight. Age Circumference (cm) Weight (g) Size

AP computer science review document - Eaton high school - essay

470 words - 2 pages to the text · Participates reluctantly in the group discussion · Offers little information from role tasks · Offers few opinions and makes limited connections to the text · Does not participate in the group discussion · Offers few opinions and makes few personal connections to the text Reflection on your performance, including what you can do to improve next time: This time for the questions I worked hard into making them complex that would help

HHS Privacy Policy: Personal Health Information - Health Science- UWO - Assignment

1357 words - 6 pages past patients, we would not be able to provide the excellent level of care and services we currently do. • HHS may provide health information for the purpose of research. Where the law permits, researchers may use this information for the purposes of research without patient consent. Other forms of research, such as clinical trials or clinical investigation that may have a direct impact on your care, requires your specific permission. A member of

Computing fields and how they vary - Orientation to Computer Science - Essay

1003 words - 5 pages to the next. It is also important for most people studying these fields to know about designing databases efficiently and how to implement them. The study of computer science is what most people who want to focus on coding choose to study. The focus of computer science is programming and computing, so it’s heavily based on understanding why code works the way it does. As a result, there is a deep study of algorithms. On top of that, computer

Ocean Conversation and the environment - Science and Technology - Research Paper

1732 words - 7 pages , universities need to introduce courses that is much related to the field and more practical. Other field-based courses that may be developed will address specific areas within the biological and physical sciences, technology and information management skills for creating and using ecological data, as well as visual arts and literature focused on the natural environment. These courses could feed back general descriptive data on each reserve. That is

Similar Papers

Impact Of Information And Computer Technology On Production Planning And Control Systems

1283 words - 6 pages Impact of advances in information and computer technology on production planning and control systemsTechnology advancement has increased greatly over the last couple of decade; these advances has had an impact on music, art, science, media, entertainment and manufacturing and a seemingly endless number of other fields. However, the aim of this literature review is to assess the impact of information and computer technology on production planning

Computer Hardware Engineers Essay

889 words - 4 pages Computer Hardware Engineer Where would we be at a technological state without Computer Hardware Engineers? They are responsible for creating the technology that powers the world.These people create, develop and analyze the making of many essential parts of a computer, including the CPU, support logic, Microprocessors, custom integrated circuits, and other extras such as printers, disk drives, monitor, etc. I will be explaining many subjects

Information Technology In Banking And Financial Institutions

1614 words - 7 pages the deposit process previously carried out through ATM's. This deposit machine also decreased the demand for cashiers. Apart from the benefits gained from information technology which facilitated the payment systems, it also increased the number of people redundant because nowadays it seems that machines are taking over men.ReferencesName Publisher Year AuthorOf ofBook Publishing'AS' Level ICT Gallway 2000 Heathcote'A' Level computing Gallway 2000 HeathcoteManaging CIB 1999 FawcettInformantion - PAGE 7 -

Information Technology Org Strategy It Strategy Essay

3104 words - 13 pages leading the design and integration of enterprise-level technical solutions • Advanced knowledge of virtualization platforms and understanding of TCP/IP in the virtual environment, including VLANs, routing and virtual switches Education Requirements • BS Computer Science or Engineering • Industry Cloud Certifications Goals Goal: Review and analyze current technology infrastructure and its ability to support strategic