This essay Building A Computer has a total of 2317 words and 9 pages.
Building A Computer
BUILDING A COMPUTER
With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance.
Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate system of microscopic switches called transistors found inside of computer chips. Binary system is defined as counting system that uses two digits one and zero (Gookin 49). A transistor is a basic building block of microchips; transistors are combined in formations called logic gates (White 39). “Transistor can only create binary information: one if current passes through or zero if current does not, to work with transistors”(White 39). Computer software uses Boolean logic, which is based on selecting true or false values used in computer programming (White 39).
All personal computers have BIOS, which is an acronym for Basic Input Output System. The BIOS runs every time the computer is started, and it basically tells the computer how to act (White 19). The BIOS is a part of the boot up process, or a complex set of operations checking hardware that components are working properly. Besides BIOS and several other operations there is power–on self-test - POST being ran. POST test runs at the start up, and if it finds an error, it sends a warning message (White 5).
Central processing unit – CPU is the most important part of the personal computer, all other components work as a bridge to CPU (White 59). The speed of the processor is usually defined by using units called megahertz (MHz, also million frequency waves per second). CPUs are generally divided into two categories- CISC and RISC. CISC – complex instruction set computing, uses many small instructions to carry out a single operations. CISC is a standard in today’s processors. RISC – reduced instruction set computing, uses less complicated instructions with simpler design. RISC microprocessors are cheaper, they produce less heat, and they are generally smaller in size compared to CISC. With less heat and smaller size RISC processors have great advantage in reaching higher frequencies with less danger of overheating. The major disadvantage and also reason why RISC microprocessors are not widely used, is less compatibility with available software. The earlier programs were written for CISC chips. In order to reach maximal speed, and compatibility the major manufacturers of microprocessors such as Intel, use some advantages of RISC technology, to improve the performance of their CISC compatible microprocessors (White 55).
Computer microprocessor is the most important part of the PC, but it can not work by it self. One of the few primary components is BUS, also called a highway of the computer. BUS transports data among the processor, random access memory, and hard disk. Speed of the BUS depends on the type of motherboard where it is installed (White 119).
Random access memory- RAM is also attached to the motherboard- base of all the components, but unlike BUS, RAM can be easily removed and changed. Random access memory works as a staging area for the central processing unit (White 43). Capacity of random access memory is very important for the performance of a computer. In case there is not enough RAM the software can create space on the hard drive to be used as temporary operating memory (White 31). Random means that any part of the memory can be accessed at any time, it is not necessary to read all of the memory to find one location. RAM is usually fast, temporary memory where data is saved until removed or power is turned off on the computer (White 43).
“A hard drive is the workaholic of a PC system.”(White 87)) It is based on using magnetic plates; spinning at extreme speeds up to 7,200 rotations a minute, which are 120 spins every second. Even with extreme speed and microscopic accuracy modern hard drives are unlikely to fail. The hard disk is a combination of electronic and mechanical portions, which makes it the one of the slowest parts of the computer (White 87).
A graphic card is usually plugged into one of the expansion
Topics Related to Building A Computer
Computing, Computer hardware, Electronic engineering, Classes of computers, Digital electronics, Office equipment, Personal computer, Expansion card, Motherboard, Complex instruction set computing, Computer, Bus
Essays Related to Building A Computer
Mis DevelopmentMis Development MIS Development The term Management Information Systems (MIS) has come to refer to a wide range of applications of computers to data processing and analysis problems in the private and public sectors. The pace of developments in computing in general, and MIS in particular, is breathtaking. Traditional concepts of how computers can and should be integrated into businesses are being challenged by worldwide telecommunications and transmission of sound, graphics, and video alongside
Ai - Edge Of ExcellenceAi - Edge Of Excellence Running head: The Edge of Excellence The Edge of Excellence Kathleen P. Munn Community College of Philadelphia Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing p
What Computer Skills Do Employers Expect From ReceWhat Computer Skills Do Employers Expect From Recent College Graduates? What Computer Skills Do Employers Expect From Recent College Graduates? Philip Davis, Instructional Technology Librarian Cornell University Ithaca, N.Y. Table of Contents Cornell University 2 Cornell Library Conducts Study 2 Research Methodology 3 A Review of the Results 3 Rankings, Groupings, and Correlations 4 Ranking Computer Skills: 4 Grouping Computer Skills: 4 Other Computer Skills 4 Comments From Employers 5 Variabili
Building A ComputerBuilding A Computer BUILDING A COMPUTER With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance. Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate
Internet Access In The WorldInternet Access In The World REFERENCES Albrecht, Kirk. Cybersurfers of Arabia. Business Week (1996): 108. Bogert, Carroll. Chat rooms and chadors. Newsweek 126 (1995): 36. Bollag, Burton. Better Internet Access Sought for Researchers Around the World : Industrialized Nations Push for Faster Connections and Uniform Regulations. The Chronicle of Higher Education v42 n42 (June 28, 1996) : pA14-17. Burton, Bollag. In Western Europe, 12 Institutions see the Internet and videoconfrences as keys to vi
Artificial IntelligenceArtificial Intelligence Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? Medical facilities, police departments, and manufacturing plants have all been changed by AI but
Operating SystemsOperating Systems Purpose The first thing I wanted to do for this project was to determine how the computer system I chose was going to be used. I wanted to purchase a personal computer system, with monitor and printer that I could use to do Web-based research. The research will be done out of my house. It will be primarily based on comparing different start-up companies to determine investments for the future. Since I determined that all my research was going to be over the Internet, it was imp
Types Of Computer VirusesTypes Of Computer Viruses A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if it is not removed. Some viruses are more dangerous than others. One of the most common places for a computer virus to appear is on a file found on the Internet or attached to an E-mail. For example, you may have a virus that just pops a message box on your screen, and then the virus is disabled, or you can have a vir
A+ Certification RequirementsA+ Certification Requirements REQUIREMENT #2 A + CERTIFICATION THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL CERTIFICATIONS. THIS CERTIFIES THE COMPENTENCY OF ENTRY-LEVEL (6 MONTHS EXPERIENCE) COMPTER SERVICE TECHNICIANS. CERTIFICATION PROVIDES THE CREDIBILITY, RECOGNITION OF ACHIEVEMENT, AND QUALITY ASSUANCE OF THE INDIVIDUAL TO THE HIREING ORGINIAZITION. THE CERTICATION IS OPEN TO ANYONE WHO WISHES TO TAKE IT. THERE IS NO
Computing Power UnleashedComputing Power Unleashed This article mainly deals with the microprocessor chip, which is the computer\'s brain. This computer chip is responsible for the majority of the computers functions, it\'s commonly referred to as the Central Processing Unit (CPU). It receives and executes your instructions and determines if your computer understands software written for a Personal Computer (PC) or a Macintosh (MAC). The CPU chip size is small, about half the size of a business card, and just as small a
Computing ProfessionalComputing Professional A Formal Comprised Interview of ‘Devin Blank’ “Computing Professional” Compiled by Damon Blank 10-01-00 Intro to Programming ITSE 1402 A Formal Interview of ‘Devin Blank’ The computer industry has taken a remarkable turn over the past 10 years. The foundation of multi-million dollar companies rest on the hands of those skilled to handle the demands of today’s business networks. Email, fax and file services, print sharing and remote file access, are among the many vital fun
How To Computerize Your AccountsHow To Computerize Your Accounts Mark Demayo OUTLINE THESIS: I will explain the steps that need to be taken to computerize business accounts. The steps are planning and informed selecting of hardware, software, and training. I. Making the decision to computerize II. Choosing the correct tools A. Software B. Hardware C. New and old technology III. Installation and training In the normal course of a day our lives are affected by the technology of computers in ways we can only begin to imagine. “Th
Privacy And Information TechnologyPrivacy And Information Technology Geoffrey Graves MG3700 Mid Term Exam 4/24/2000 Part I 1.) In order to produce an upwards swing in revenue, Toy World must track its customer’s buying trends with more accuracy and more detail. The Point of Sale system that they are currently working from can be improved and made to reduce after-market inventory. Trend data can be used for a wide variety of purposes. One of the first problems is the store design and layout of items. Sale items and hot merchandis
Intel: A CorporationIntel: A Corporation A corporation is a business that, although owned by one or more investors, legally has the rights and duties of an individual. Corporations have the right to buy, sell, and own property. Corporations may make legal contracts, hire and fire workers, set prices, and be sued, fined, and taxed. A business must obtain a charter of incorporation from a state legislature or Congress to be legally recognized as a corporation.(Watson, p211) While corporations didn\'t exist until the
Java vs. C++Java vs. C++ subject = Freshman title = Java vs. C++ Since their inception, computers have played an increasingly important role in today’s society. Advancements in technology have enabled computers to become faster and cheaper. Today, the majority of families own a home computer that is vastly more powerful than giant mainframes of years gone by. Computer hardware has been evolving rapidly with no end in sight, and with all of the advancements in computer hardware come advancements in computer
Survey of Wireless Computing Survey of Wireless Computing School Of Computer Science Florida International University Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a
History of the Computer Industry in AmericaHistory of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been around for over a half-century
Software LicensingSoftware Licensing In 1993 worldwide illegal copying of domestic and international software cost $12.5 billion to the software industry, with a loss of $2.2 billion in the United States alone. Estimates show that over 40 percent of U.S. software company revenues are generated overseas, yet nearly 85 percent of the software industry\'s piracy losses occurred outside of the United States borders. The Software Publishers Association indicated that approximately 35 percent of the business software i
Swot Analysis Of Dell ComputerSwot Analysis Of Dell Computer SWOT analysis of Dell Computers History: The company was founded in 1984 by Michael Dell, now the computer industry\'s longest-tenured chief executive officer, on a simple concept: that by selling personal computer systems directly to customers, Dell could best understand their needs, and provide the most effective computing solutions to meet those needs. Today, Dell is enhancing and broadening the fundamental competitive advantages of the direct model by increasin
Modular ArithmeticsModular Arithmetics MODULAR ARITHMETIC: Modular arithmetic can be used to compute exactly, at low cost, a set of simple computations. These include most geometric predicates, that need to be checked exactly, and especially, the sign of determinants and more general polynomial expressions. Modular arithmetic resides on the Chinese Remainder Theorem, which states that, when computing an integer expression, you only have to compute it modulo several relatively prime integers called the modulis. The
Artificial IntelligenceArtificial Intelligence Artificial Intelligence is based in the view that the only way to prove you know the mind\'s causal properties is to build it. In its purest form, AI research seeks to create an automaton possessing human intellectual capabilities and eventually, consciousness. There is no current theory of human consciousness which is widely accepted, yet AI pioneers like Hans Moravec enthusiastically postulate that in the next century, machines will either surpass human intelligence, or
Hacker's HellHacker\'s Hell To deal with hackers who break through office systems through the Internet it is important for information managers to understand their enemy well. If they have sound background knowledge about hackers, they might be prepared to deal with them in a much more effective method. Hackers are very educated often mostly university or high school students who try to break through systems for which they have no authorization. They deal poorly with people, have few friends and less relatio
Internet PrivacyInternet Privacy One of the most important advances in the rapidly developing world of electronic commerce is the ability of companies to develop personalized relationships with their customers. Personalization empowers companies to better understand their customers\' wants and desires and improve customer service by tailoring offerings to the unique needs of individuals . At the same time, this has become a subject of hot controversy because the technology involves the extensive collection and
Computer CrimeComputer Crime THESIS: Laws must be passed to address the increase in the number and types of computer crimes. Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today\'s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at th