Computer Hardware Essays (Examples)

1000+ documents containing “computer hardware”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Computer Fundamentals the Pace of
Pages: 6 Words: 1767


Subtopic 6: Job management and protection; include a serious discussion of security aspects

The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell, 2010). Defining operating systems to have partitioned memory is just the start, as Microsoft learned with their Windows NT platform. Dedicated memory partitions by user account can be hacked and have been (Funell, 2010). The need for greater levels of user authentication is required, including the use of biometrics for advanced systems that have highly confidential data within them. The reliance on security-based algorithms that also seek to analyze patterns of use to anticipate security threats are increasingly in use today (Volkel, Haller, 2009). This aspect of an operating system can capture the levels of activity and the patterns they exhibit, which can provide insights into when a threat is present or not. The use of predictive security technologies, in addition…...

mla

References

Boudreau, K.. (2010). Open Platform Strategies and Innovation: Granting Access vs. Devolving Control. Management Science, 56(10), 1849-1872.

Jason Dedrick, & Kenneth L. Kraemer. (2005). The Impacts of it on Firm and Industry Structure: The Personal Computer Industry. California Management Review, 47(3), 122-142.

Furnell, S.. (2010). Usability vs. complexity - striking the balance in end-user security. Network Security, 2010(12), 13-17.

Larus, J.. (2009). Spending Moore's Dividend. Association for Computing Machinery. Communications of the ACM, 52(5), 62.

Essay
Computer IBM Entered the Computer
Pages: 20 Words: 8433

To some users of personal computers, who state, never trust a computer that you cannot lift; the IBM has been viewed, more often than not, as an enemy, and according to Byte, the computer magazine, this was because of the fact that the IBM company rose to fame mainly on the basis of its mainframe computers, that were large and forbidding, and overwhelmingly bulky. This was probably why, when the rest of the world was eyeing the emerging opportunities in the minicomputer market, the IBM never paid any attention, and even though IBM did succeed in capturing a large chunk of that market, it did not happen until Digital had captured the minicomputer market and had grown into a large corporation.
In the past few years, IBM has agreed to change the ways in which it conducts its business, and adapt to the changing times when the prices of computers…...

mla

References

Ellett, John. "About / Best Practices Center, Results Oriented Integrated Marketing the Dell

Way" Retrieved at   accessed 27 July, 2005http://www.nfusion.com/about/best_practices/Results-Oriented_Integrated_Marketing.html .

Konrad, Rachel. (10 August, 2001) "From Bits to Boom, IBM PC turns 20" Retrieved at   accessed 27 July, 2005.http://ecoustics-cnet.com.com/Mixed+record+as+PC+turns+20/2009-1040_3-271422.html .

Outsourcing Law, Deal structure, Case Study." Retrieved at accessed 27 July, 2005http://www.outsourcing-law.com/DealStructures/IBM.Lenovo.2005.01.06.htm.

Essay
Computer Hard Drives
Pages: 6 Words: 1684

Computer Hard Drives
The globalization of computer technology offers a vast number of remarkable tools, devices, applications, and advanced equipments that brings comfort in our daily work and activities. New features, designs, and capabilities of various computer peripherals and hardware are continuously being developed and brought out to market for better performance of the current technology. One very important part of a computer that experiences the trend of up-to-date improvement is the Hard Drive.

This paper aims to provide information on the evolution of computer hard drives. Included in this paper is the history of hard drive, from the time it was developed as computer hardware up to the continuous production of new and upgraded performance of data storage mediums. The various types of this technology, its changing features, and the companies who provide us with this dependable hardware are also discussed in this paper.

Introduction

Of the diverse parts of a computer, the…...

mla

Bibliography

Legard, David. Smaller, Faster Hard Drives Coming Soon. PC World. 2003.

Kozierok, Charles. A Brief History of the Hard Disk Drive. PC Guide. 2001.

Byard, Larry. Hard Disk Drive Guide History.

Dux Computer Digest. 09 April 2003. http://www.duxcw.com/digest/guides/hd/hd2.htm

Essay
Hardware and Software Uses on a Computer
Pages: 2 Words: 676

Computer Maintenance Importance of Hardware and Software for the Computer
Computer hardware refers to the physical entities of a computer like a motherboard, keyboard, mouse, RAM, hard drive etc. These components are designed to perform particular functions that are directed by the software. The hardware components are used to power and control the computer making is usable. Most of the hardware components are mostly hidden meaning that they are not seen and are enclosed within the casing of the computer. Hardware and software are interconnected. Without software hardware of the computer would not have any function. Computer hardware is limited to the specific tasks that are taken independently. Software consists of the instructions that tell the hardware how to perform a particular task. Software has the ability to perform numerous tasks as opposed to hardware which only performs mechanical tasks that it is designed for. Software is important because it offers the…...

Essay
Computer Addiction Causes and Potential
Pages: 3 Words: 874

This is what creates the continual need to share literally everything going on in their lives, as each post releases a significant dopamine rush (Charman-Anderson, 17, 18).
Dopamine is also the reason why the many forms of computer addiction are so difficult to treat. ith anonymity comes the opportunity to create multiple identities or personas online (Soule, 66, 67). This is what leads employees who have Internet addictions to create many different online identities, giving them ethical and moral leeway they would never give themselves. This aspect of personas and the forgiven unethicacy of conduct of personas is a key factor in online crimes committed by employees during company hours (Nykodym, Ariss, Kurtz, 82, 83). The personas of the addicted computer addicts are orchestrated for specific dopamine-driven production to fuel and feed habitual behaviors online

(Quinn 180). These strategies to ensure a steady supply of dopamine may not even be obvious…...

mla

Works Cited

Charman-Anderson, Suw. "Seeking Addiction: The Role of Dopamine in Social Media." Computer Weekly (2009): 16-23.

Neumann, Peter G. "Are Computers Addictive?" Association for Computing Machinery.Communications of the ACM 41.3 (1998): 128-135.

Nykodym, Nick, Sonny Ariss, and Katarina Kurtz. "Computer Addiction and Cyber Crime." Journal of Leadership, Accountability and Ethics (2008): 78-85. ABI/INFORM Complete. Web. 3 Dec. 2012.

Quinn, Brian. "The Medicalisation of Online Behaviour." Online Information Review 25.3 (2001): 173-80.

Essay
Computer History it Is Said
Pages: 5 Words: 1593

In some areas it will be used for more populist applications such as, in schools to introduce students to the discipline and within an environment that will give opportunity for participation of non-academics in academic discussion.
Conclusion

Computer has in a great deal widened the world's knowledge. As the fastest technology that has ever evolved, it has given opportunity for the children and adults, for personal, academic and commercial use. It has made communication to be easier; people get to know what is happening in the other parts of the world instantly. Information and data entering and saving has been made convenient and even easy.

eference

Ceruzzi, Paul E. A History of Modern Computing. London: The MIT Press, (2000). The MIT Press. etrieved March 8, 2012 from http://www.ieeeghn.org/wiki/images/5/57/Onifade.pdf

Moreau, . The Computer Comes of Age -- the People, the Hardware, and the Software. London: The MIT Press, (1984). etrieved March 8, 2012 from http://www.ieeeghn.org/wiki/images/5/57/Onifade.pdf

oderick…...

mla

Reference

Ceruzzi, Paul E. A History of Modern Computing. London: The MIT Press, (2000). The MIT Press. Retrieved March 8, 2012 from  http://www.ieeeghn.org/wiki/images/5/57/Onifade.pdf 

Moreau, R. The Computer Comes of Age -- the People, the Hardware, and the Software. London: The MIT Press, (1984). Retrieved March 8, 2012 from

Essay
Computer Contracting Opportunities for a Computer Component
Pages: 4 Words: 994

Computer Contracting
Contracting Opportunities for a Computer Component Manufacturer: Trends in Federal Spending

The pace of technological development is now faster than it ever has been at any other time in human history, and this pace has been steadily increasing for several decades. The emergence of the computer in the first half of the twentieth century could not have foretold the power and mobility that these devices would provide a few short generations later, nor the opportunities that continuing advancement and technological growth would supply to businesses. For Vigilant Technology, a manufacturer of computer components, the opportunities are virtually endless. Selecting the most profitable route forward can be made more difficult by the abundance of choices, yet an examination of the current contracts being offered by the federal government can help indicate the large-scale trends needed for long-term profits, not to mention providing immediate short-term gains in terms of the contracts themselves.…...

mla

Reference fbo.gov. (2011). Accessed 23 April 2011.

 https://www.fbo.gov/?s=main&mode=list&tab=list

Essay
Computer Clustering Involves the Use of Multiple
Pages: 8 Words: 2319

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IM offer clustering technology. This paper describes why and how clustering is commonly used for parallel processing, batch processing, load balancing and high availability.
Despite some challenges such as achieving transparency, mitigating network latency and the split-brain problem, clustering has proven to be a huge success for bringing scale and availability to computing applications. Hungry for even more efficient resource use, IT departments are now turning their eye on the next evolution of clustering called grid computing.

Parallel processing is the processing of program instructions by…...

mla

Bibliography

Beowulf clusters compared to Base One's batch job servers Retrieved May 2, 2004 from Web site: http://www.boic.com/beowulf.htm

Burleson, D. Requirements for parallel clusters. Retrieved May 1, 2004 from Web site:  http://www.fast-track.cc/teas_ft_rac07.htm 

Cluster computing. Retrieved May 1, 2004 from Web site:  http://search390.techtarget.com/sDefinition/0,sid10_gci762034,00.html 

D'Souza, Marco (2001, April 13). Meeting high-availability through clustering. ZDNet. Retrieved May 2, 2004 from Web site:  http://www.zdnetindia.com/biztech/services/whitepapers/stories/19538.html

Essay
Computer Fraud and Abuse Act
Pages: 7 Words: 2541

Computer Fraud and Abuse Act
Information technology and related systems provide multiple benefits to business, government, and individual users. Databases, Internet transactions, and emails contain sensitive customers, employee and operations data that are extremely vulnerable. The following study focuses on various components of IT and related systems used for the storage of information like computers, servers, and website databases. Whilst identifying the ways the date can be compromised and exposed to abuse, the study identifies ways of protecting and enhancing their integrity.

Types of information systems that that hold data

Computers

Computers do their primary work in parts that are not visible when using them. To do this, a control center that converts data input to output must be present. All this functions are done by the central processing unit (CPU) a highly complicated set of electric circuits that intertwine to store and achieve program instructions. Most computers regardless of the size must contain…...

mla

References

Adikesavan, T.A. (2014). Management Information Systems Best Practices and Applications in Business. New Delhi: PHI Learning Pvt. Ltd.

Bradley, T. (2006). Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security: Everyone's Guide to Email, Internet, and Wireless Security. New York: Syngress

Khosrowpour M. (2006). Emerging Trends and Challenges in Information Technology Management: 2006 Information Resources Management Association International Conference, Washington, DC, USA, May 21-24, 2006 Volume 1. Washington: Idea Group Inc. (IGI)

Kim, D. & Solomon, M. (2010). Fundamentals of Information Systems Security. New York: Jones & Bartlett Learning

Essay
HP Compaq and the Computer
Pages: 3 Words: 786

Other partnerships with software companies provide HP with personalized value-added services for broadband Internet services and solutions.
Analysis of Compaq's competitive advantage over HP and other computer companies show that even though it has had experience with it servicing, its focus on small- to medium-sized computer companies did not, apparently, induced growth within the company, even though it services comprise 30% of the company's total revenue. The stagnation of growth illustrates how it servicing in Compaq is still on its preliminary stage, primarily because of the small scope of its clientele, even subsisting to "older" computer products, such as Tandem and Alpha, for use in its it services and consultancies.

Looking at the competitors of HP-Compaq, three major companies emerged as the leaders of the it service market: Electronic Data Systems (EDS), IBM, and Unisys. EDS' advantage is that it has a partnership with Dell, offering services such as help-desk service,…...

Essay
Apple Computer About the Company
Pages: 12 Words: 5626

The first of these was co-designed with Sony, and established the modern layout for laptop computers that has remained popular ever since.
In 1994, Apple revamped its Macintosh line with the introduction of the Power Macintosh, which was based on the PowerPC line of processors developed by IM, Motorola and Apple. Apple's operating system software was adjusted so that most software written for the older processors could run in emulation on the PowerPC series.

After an internal power struggle with new CEO John Sculley in the 1980s, Jobs resigned from Apple and went on to found NeXT Inc., which Apple ultimately bought. This move brought Jobs back to Apple's management. On July 9, 1997, Gil Amelio stepped down as CEO of Apple after overseeing a 12-year record low stock price and crippling financial losses. Jobs stepped in as the interim CEO and began the critical restructuring of the company's product line.

One…...

mla

Bibliography

Apple Computer, Inc. Five-Year Financial History. Cupertino, California: 2005.

Apple Computer, Inc. Q2 2005 Unaudited Summary Data. Cupertino, California: 2005.

Apple Computer Inc." Quote.com. July 13, 2005. July 18, 2005  http://finance.lycos.com/qc/research/marketguide.aspx?pg=cafl&symbols=NASDAQ:AAPL .

Apple Computer, Inc. United States Securities and Exchange Commission: Form 10-K. Cupertino, California: November 30, 2004.

Essay
PC and Machine's World Computer
Pages: 5 Words: 1836

(but they are these days more and more used around the globe)
The common characteristic of all input devices is that they encode or convert information of various types into data that can enter a further processing phase performed by the computer system. Output devices decode the data into information that can be easily understood by people, which are ultimately the users of a computer. This way, the computer system may be viewed as no more than a data processing system.

As far as electromechanical engineering technology is concerned, it enables engineers to design automated systems. Students need to learn to use computers, math, and advanced science in order to design such systems. Learning how to install and test robotics equipment is also important, and is performed by using computers.

Even apparently simple devices, such as candy machines, involve various technologies. For instance, the little rollers (a mechanical device) pull the coin…...

mla

Reference:

1. Encyclopedia Britannica, 1997 Edition - Articles on Computers and Computer Technology

2. en.wikipedia.org/wiki/Computer

3. www.aspire.cs.uah.edu/textbook/introcomp6.html

4. www.iseek.org/sv/22030.jsp%3Fid%3D241200

Essay
Dell Computer Corporation Expansion Overseas in the
Pages: 5 Words: 1599

Dell Computer Corporation Expansion Overseas
In the past ten years, foreign expansion has become a major part of the business community. Many companies are seeking to expand globally in an attempt to maximize profits. This research paper will explore the foreign expansion of the Dell Computer Corporation. e will explore the ways in which this relatively young company has expanded overseas. e will examine the history of the company, the industry and the ways in which the company has expanded.

History of Dell

Dell Computer Corporation was founded by Michael Dell in 1984 and was incorporated in 1987 and has grown substantially in recent years. ("Dell Computer Corporation (NASD) - Business Description") The growth of the company has been unprecedented in lieu of the relatively young age of the corporation. ("Dell Computer Corporation (NASD) - Business Description") The headquarters for the corporation is located in Austin, Texas Dell's products include laptops, desktops and…...

mla

Works Cited

About Us.  http://www.gateway.com/about/coinfo/corpbg.shtml 

Company Overview. Dell Computer Corporation Corporate Web site. © 2001-2002 Dell Computer Corporation.  http://www.dell.com/html/us/corporate/brochure/global.htm 

Computer Hardware Industry and Profile." Yahoo Finance.  http://biz.yahoo.com/ic/12.html 

Dell Claims Major Inroads in Chinese Market." ComputerGram International. Issue: Sept 30, 1999.  http://www.findarticles.com/cf_0/m0CGN/3758/55943311/p1/article.jhtml?term=Dell+foreign+expansion

Essay
Dell Is One Among the Largest Computer
Pages: 15 Words: 4282

Dell is one among the largest computer system companies in the world, which is unique and popular because of its direct marketing policy. It deals in manufacturing personal computers, servers or enterprise products, storages and offer IT solutions for the customers. The services provided by the company are of high quality and low cost, thus providing the source of economical investment to the clients. Dell is among the pioneers and still a unique company that carry direct marketing operations. It started its sales via telephone and then expanded it using internet.
A 19-year-old teenager Michael Dell founded Dell in 1984 with only $1,000 capital. He started business with an aim of selling IM-compatible PCs. Dell received high worldwide success and profit in just few years of its functions. During the first year, it made $6 million gross revenue. The next year, Dell started selling computer of its own design name the…...

mla

Bibliography

Bennett, P.D. (1995). Dictionary of Marketing Terms. McGraw-Hill Chicago, McGraw Hill, American Marketing Association.

Business Teacher. (2011). Dell Marekting Approach. Retrieved from Business Teacher:  http://www.businessteacher.org.uk/free-marketing-essays/dell-marketing-approach/ 

DELL. (2012). Dell PowerEdge 12th Generation Servers. Retrieved 2012, from Dell:   infusion . (2012, May 9). Dell PowerEdge 12th Generation Servers. Retrieved 2012, from Infusion:  http://infusiongeek.com/05/dell-poweredge-12th-generation-servers http://content.dell.com/us/en/enterprise/d/campaigns/poweredge-12th-generation-servers-ple.aspx?c=us&l=en&s=biz&dgc=IR&lid=9E615553&cid=&ref=gzilla 

Jacobs, B. (2012). Dell PowerEdge 12th Generation Servers - Fastest to Market, with Stellar Reviews . Retrieved 2012, from Dell:  http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2012/07/10/dell-poweredge-12th-generation-servers-fastest-to-market-with-stellar-reviews.aspx

Essay
Computer What Is Going to
Pages: 10 Words: 4223

In the same year, the founders started a new company for computer development called the Eckert-Mauchly Computer Corporation. By 1949, this company launched the BINAC or Binary Automatic computer. This computer made use of magnetic tape for the storage of data. Then this company was bought by emington and Corporation and the name was changed to Univac Division of emington and. This company was the organization to bring out UNIVAC which is one of the originals of the type of computers that are used today. (Inventors of the Modern Computer: The ENIAC I Computer - J Presper Eckert and John Mauchly)
1951 - UNIVAC begins to take over the business industries market:

Presper Eckert and John Mauchly set up their company and found their first client in the United States Census Bureau. The population of United States was growing very fast due to the baby boom that was taking place then…...

mla

References

Bellis, Mary. "Inventors of the Modern Computer: The Atanasoff-Berry Computer the First

Electronic Computer - John Atanasoff and Clifford Berry." Retrieved at   Accessed 6 October, 2005http://inventors.about.com/library/weekly/aa050898.htm .

Bellis, Mary. "Inventors of the Modern Computer: The ENIAC I Computer - J Presper Eckert and John Mauchly" Retrieved at   Accessed 6 October, 2005http://inventors.about.com/library/weekly/aa060298.htm .

Bellis, Mary. "Inventors of the Modern Computer: The Harvard MARK I Computer - Howard

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now