Friday, August 23, 2019
Summarize lectures Essay Example | Topics and Well Written Essays - 1250 words
Summarize lectures - Essay Example It could be on managerial or strategic levels. Egoistic and empathetic thinkers are two main factors in collaborative problem solving. Thus the eight principles of IS have been helping organizations to get advantage over other organizations. Hardware and software are the two main components of computing technology. Hardware is the main mechanical structural part of a computing device. It mainly consists of CPU. The CPU reads and processes the information and present it on the monitor screen. There are two forms of data storage in a computer: volatile and non volatile. Volatile form of storage is provided by the compact disks and memory cards whereas the non volatile storage form is provided magnetic disk which also stores data for long term. The computer processes data in the form of bits. Server and client computers work in coordination with each other where the server is providing specific services to the client computer. The operating systems and the software to be used in the computer are usually purchased and they are different for different hardware companies. Software also come to protect a computer from attacks of viruses and malware. Database is usually used to keep the record of things which contain complex material and involving more than one field. A database application usually revolves around the user, the application, database management system and the metadata. The main the most important of these components is the database management system. It is the system which is the central unit of the application and stores and administers the database. The first and the main function of the database management system is to create the required structure including tables for the database. Processing of the submitted information and providing tools to the user or its management are the third and fourth functions of DBMS respectively. Special terminologies e.g. entity for table and identifier for key are being used in the database model system. Poorly
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.