This website uses cookies to ensure you have the best experience. Learn more

Types Of Computers Essay

1312 words - 6 pages

TYPES OF COMPUTER
Let us discuss the different types of computers that we see today. Although they belong to the fifth generation they can be divided into different categories depending upon the size, efficiency, memory and number of users. Broadly they can be divided it to the following categories.
1.Microcomputer: Microcomputer is at the lowest end of the computer range in terms of speed and storage capacity. Its CPU is a microprocessor. The first microcomputers were built of 8-bit microprocessor chips. The most common application of personal computers (PC) is in this category. The PC supports a number of input and output devices. An improvement of 8-bit chip is 16-bit and 32-bit chips. ...view middle of the document...

Examples of supercomputers are CRAY YMP, CRAY2, NEC SX-3, CRAY XMP and PARAM from India.

http://sapict2011templomms.blogspot.com/2011/07/different-types-of-computers.html

Digital computers are further classified into number of groups depending upon the processing power, functional capabilities and size of memory. Mainframes computers are huge that can occupy the all rooms space easily. These computers are used in Government sectors and in large organizations for secure and critical applications like bilk data processing and ERP. Mainframes have capabilities to host multiple operations systems and virtual machines. Minicomputers are like the mainframe computers, mostly used in business organization and corporate sector. The difference being that it can support the simultaneous working of up to 100 users and is usually maintained in business organizations for the maintenance of accounts and finances. Minicomputers lie in between mainframes and microcomputers In terms of size and processing capacity.
Supercomputers are same as mainframes, less bulky in sizes and are used for high speed calculations and data processing in effectively manners, in the areas of Quantum physics, economic forecasts and engineering designs. Supercomputers have ability of parallel processing and well-designed memory hierarchy that enhances large transaction processing powers. Microcomputers also known as “Personal Computers” are the smallest in size and have small memory and processing capabilities than mainframes and supercomputers. Microcomputers consist of microprocessor and its central processing unit. These are the most frequently used computers specifically designed for home and office users.
Desktops are commonly used computers in today’s world, which are specially built for personal user to be using them at home or work. Desktop computers can be used for communication, entertainment, education, games, internet, word processing and for lot more. Desktop computers are placed on one location permanently as they occupy some space and it is difficult to carry them one place to another easily. Keyboard and mouse are attached for input and for output monitors/LCD are attached with desktop PC. Laptops also known as Notebook are portable computers. Such type of computers can be carried any where easily. The people in the business have to travel a lot, laptops are suitable for them to have their personal data with them everywhere. The main idea about notebooks is same as desktop but with lighter weight and size for mobile use. Keeping mobility of computers in mind, rechargeable batteries are installed laptops. Now, Netbooks, enhanced version of notebooks, much lighter in weight with high performance ability, are now available in market.
PDAs (Personal Digital Assistant) are handheld personal computers; these are small enough to be fit in human hands. PDA has a touch screen and a memory card for storage of data. WiFi technology is used in PDAs for internet and for...

Other assignments on Types Of Computers

Cause And Effect Of Computer Revolution

1488 words - 6 pages to at home as well as applications they may not be able to afford. Schools have these computer program applications available for student use some examples are; teaching software development, hardware design these types of applications are considered indispensable to the modern computers. Reich illustrates the data management by computers in teaching music "songs, instrumental pieces, recordings, information about composers, information from

Accounting For Decision Making Essay

765 words - 4 pages GSM5301 Accounting for Decision Making MID TERMEXAMINATION 3 July 2013 8 pm - 10 pm Instruction: Answer ALL questions. Show all workings and answers in answer book provided. QUESTION 1 (10 marks) If you are looking to invest in a publicly listed company, what are the types of financial and non-financial information inside the annual report of that company that are important for you? Why are these two types of information important for

Dhsdnidbnehjwdbewhjfb

3050 words - 13 pages Introduction to Computer Hardware In general, there is very little that you as a future manager need to know about computer hardware, other than some basic vocabulary. The key ideas we want to you understand about hardware are: * Computers are basically simple electronic devices. While what they do may seem magical, very little of the magic comes from the computer itself. In fact computers are limited in what they can do. * More of

Nt1210 Short Answer

440 words - 2 pages There are two types of open standards. The first is called the formal standard where it is defined by the standard-setting organization. Under the regulations of the organizations they are documented and recognized. The second example of an open standard is the informal standard. It is termed a de facto standard that eventually evolves into a formal standard. Some advantages include the ability by the device managers or the software

Implementation Of An Organization-Wide Security Plan

1112 words - 5 pages of some of the common terms: Authentication: is the process of determining whether someone or something is, in fact, who or what it is declared to be Availability: Ensuring that authorized users have access to information and associated assets when required. Confidentiality: is a set of rules or a promise that limits access or places restrictions on certain types of information Critical: Degree to which an organization depends on the continued

Project Part 2 It Security

953 words - 4 pages Classification Description: Malicious Code and Activity Task Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code

Relations

262 words - 2 pages | | |Knowledge and awareness of domestic abuse – different types of abuse, risk factors, |the particular difficulties they may face. | | |prevalence, effects and barriers to seeking help. |An understanding of the role of gender dynamics in domestic abuse

Computer Viruses

1026 words - 5 pages perpetrate cybercrimes, and they are: hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network. The term cracker refers to someone intentionally accessing a computer or computer network with malice in mind. They access computers with the

Computer

3676 words - 15 pages separate cable. The hub relays every packet transmitted by any computer on the network to all of the other computers, and also amplifies the signals. The maximum segment length for a UTP cable on an Ethernet network is 100 meters. A segment is defined as the distance between two communicating computers. However, because the hub also functions as a repeater, each of the cables connecting a computer to a hub port can be up to 100 meters long, allowing a

Disaster Plan

1163 words - 5 pages Abstract: In the situation of XYZ computers flooding, this paper is to help create a disaster plan using different raid setups that might better help this company in the long run to back up there systems. I have gone into detail what is needed for the different raid systems and what they are good for below.   The first step in making sure that you have a stable system is to make sure that you have a proper back up plan, especially when you

Mis 1

425 words - 2 pages . Define and contrast data, information and knowledge 11. Describe three or four types of jobs and career opportunities in information systems and in related fields 12. List and define three technical knowledge and/or skills core competencies 13. List and define four business knowledge and/or skill core competencies 14. List and define four of the systems knowledge and/or skill core competencies 15. List and define five types of

Similar Documents

Computers Essay

1401 words - 6 pages Computer Mario Noriega CIS 103 Abstract Computers are one of the greatest inventions in the 20th century, and they used in many fields with a lot of benefits. There are many types of computers, huge and powerful computer are employed by governments and business to perform complex tasks and store data. Computers are particular good at performing repetitive tasks at speeds far faster than any human or team of humans can. Small computers

Evolution Of Computers Essay

9431 words - 38 pages , to run on different types of computers, instructions must be rewritten and recompiled. Examples: ENIAC, EDVAC and UNIVAC. 4.1.1 Characteristics of First-generation Computers Following are the characteristics of first-generation computers: * These computers were based on vacuum tube technology. * These were the fastest computing devices of their times (the computation time was in milliseconds). * These computers were very large

Internet Technology And Web Browsers Essay

1764 words - 8 pages ranging from megabytes to gigabytes, because there is not as much loss of signal do to the range the signal will have to travel. How you can define a LAN it comes in many parts. Breaking down some of those parts we will look at what a topology is and how it affects a network. There are two types of topologies a physical topology and logical topology. A physical topology refers to how the computers are physically connected to make the shape of the

Whats Up Essay

292 words - 2 pages 7-1 -The principal components of telecommunications networks and networking technologies are? -Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large