Principles of Information Systems (MindTap Course List)
12th Edition
ISBN: 9781285867168
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 3, Problem 2TA
Program Plan Intro
Components of computer:
Computer has four major components, they are:
- Central processing unit (CPU)
- Memory unit
- Input devices
- Output devices
Central Processing Unit (CPU):
- CPU plays the key role in a computer by carrying out instructions of a computer program.
- It performs all the basic logic, arithmetic, controlling and input/output operations that are specified by the instructions.
- The CPU comprises of two units, Arithmetic logic unit (ALU) and control unit (CU).
Memory unit:
- Once computer program instructions set are transformed into machine code by CPU, the machine code is stored in memory.
- Then the CPU fetches the required data and instructions from memory and performs the required operations and then sends the result and next instructions set back to memory.
Input devices:
- The devices used by the user to feed information to the computer, such as a hard drive, keyboard, or a networking card.
- These devices get the data from outside world into the computer in the way that human eyes and ears bring the data to brain.
Output devices:
- Output devices are used by computer to deliver information to user, such as a monitor, printer, and speaker.
- The CPU takes the machine code present in memory and converts it into a format that is mandatory by monitor’s hardware.
- Then the monitor’s hardware converts that information into different light intensities so that you see words or pictures.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Do you think it's OK for app developers to provide you free (or almost free) software in return for your personal information? Are they accountable for how the data is used after collection?State your stance explicitly.
Do you think it's OK for app developers to provide you free (or
almost free) software in return for your personal information?
Are they accountable for how the data is used after collection?
State your stance explicitly.
Do you think it's OK for app developers to provide you free (or almost free) software in return for your personal information? Are they accountable for how the data is utilized once they acquire it?Declare your viewpoint unequivocally.
Chapter 3 Solutions
Principles of Information Systems (MindTap Course List)
Ch. 3.5 - Prob. 1DQCh. 3.5 - Prob. 2DQCh. 3.5 - Prob. 1CTQCh. 3.5 - Prob. 2CTQCh. 3.9 - Prob. 1DQCh. 3.9 - Prob. 2DQCh. 3.9 - Prob. 1CTQCh. 3.9 - Prob. 2CTQCh. 3 - Prob. 1SATCh. 3 - Prob. 2SAT
Ch. 3 - The time it takes to perform the fetch instruction...Ch. 3 - Each CPU produces a series of electronic pulses at...Ch. 3 - Prob. 5SATCh. 3 - Prob. 6SATCh. 3 - DDR SDRAM is faster than SRAM memory. True or...Ch. 3 - Prob. 8SATCh. 3 - The optical storage device capable of storing the...Ch. 3 - Prob. 10SATCh. 3 - Prob. 11SATCh. 3 - Prob. 12SATCh. 3 - Prob. 13SATCh. 3 - Prob. 14SATCh. 3 - Identify the three elements of a CPU and describe...Ch. 3 - Prob. 2RQCh. 3 - Prob. 3RQCh. 3 - Prob. 4RQCh. 3 - Prob. 5RQCh. 3 - Prob. 6RQCh. 3 - Prob. 7RQCh. 3 - Prob. 8RQCh. 3 - Prob. 9RQCh. 3 - Prob. 10RQCh. 3 - Prob. 11RQCh. 3 - Prob. 12RQCh. 3 - Prob. 13RQCh. 3 - Prob. 14RQCh. 3 - Prob. 15RQCh. 3 - Prob. 1DQCh. 3 - Prob. 2DQCh. 3 - Prob. 3DQCh. 3 - Prob. 4DQCh. 3 - Prob. 5DQCh. 3 - Prob. 6DQCh. 3 - Prob. 7DQCh. 3 - Prob. 8DQCh. 3 - Prob. 9DQCh. 3 - Prob. 10DQCh. 3 - Prob. 11DQCh. 3 - Prob. 12DQCh. 3 - Prob. 13DQCh. 3 - Prob. 14DQCh. 3 - Prob. 1PSECh. 3 - Prob. 2PSECh. 3 - Prob. 2TACh. 3 - Prob. 1WECh. 3 - Prob. 2WECh. 3 - Prob. 1CECh. 3 - Prob. 2CECh. 3 - Prob. 1DQ1Ch. 3 - Prob. 2DQ1Ch. 3 - Prob. 1CTQ1Ch. 3 - Prob. 2CTQ1Ch. 3 - Prob. 1DQ2Ch. 3 - Prob. 2DQ2Ch. 3 - Prob. 1CTQ2Ch. 3 - Prob. 2CTQ2Ch. 3 - Prob. 1DQ3Ch. 3 - Prob. 2DQ3Ch. 3 - Prob. 1CTQ3Ch. 3 - Prob. 2CTQ3
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- What were you expecting to learn when you initially started browsing for information online? Are there any long-term solutions to these issues?arrow_forwardWhy should app companies provide you free software in exchange for your personal information? When data is acquired, does someone else have responsibility for what happens with it?arrow_forwardDo you think app developers should get permission to release their product to the public before asking for personal information? Who is responsible for acting when it is appropriate to do so? If you could, I'd appreciate hearing your current ideas.arrow_forward
- Do you think it's ethical for app developers to swap your personal info for free software? Do they own the data?arrow_forwardTo what extent do you agree that it is moral for app developers to require you to provide personal information before using the app? Once everything is in place, whose responsibility is it to take things further?I'd want you to elaborate on the reasoning that brought you to the conclusions you've drawn.arrow_forwardHow do you feel when you see pleas for money or medical aid placed on social media by total strangers?arrow_forward
- There are many options for purchasing apps. Provide some evidence for your assertions.arrow_forwardPrepare a presentation using the presentation program you chose, on one of the following topics: The role and evolution of technology in companies.Effective presentationsThe benefits of developing PowerPoint presentations.Evolution of computers and their importance in the company.Minimum of 8 slides (Slides)Include bibliographic references in your presentation.arrow_forwardTopic : how computer technology has changed business Create a comprehensive 10-slide presentation on the transformative impact of computer technology on businesses. Each slide should provide substantial information without being excessively long or overly brief. Focus on specific technologies such as LTE, AI, cloud computing, etc., to add depth to the exploration. Address key questions in each slide, including what, why, how, and where, to offer a thorough understanding of the evolving relationship between computer technology and business. - 10 slide shows on the topic - I need something specific like "which technology has changed business", "LTE" , "AI" or "cloud computing", etc? - answering questions like, what?why?how?where?etc Answer Format: Slide 1: Slide 2: Slide 3: Slide 4: Slide 5: Slide 6: Slide 7: Slide 8: Slide 9: Slide 10:arrow_forward
- You has been given a mobile app project related to a museum, which can be used by the museum visitors. You have been asked to focus only on entrance admission, and auto guide or interactions in the museum. You need a lot of information from reliable sources to understand the context of the app to-built before you can proceed eliciting user requirements. You need to find existing systems that can give you some ideas about the domain of the app. (a) List five (5) information sources under existing system source category, which is appropriate for the project. (b) There is another category of information sources other than stakeholders and systems. List five (5) information sources under that category, which is appropriate to provide more information about the problems faced by current visitors at the museum and their possible solutions.arrow_forwardTHE GREEN DAM CYBER-CENSOR CASE Software designers, systems administrators, systems analysts, and computing and informatics experts in general face a rising number of potential ethical concerns as technology and globalization become more widespread and complicated. Instructions: Read the case introduction below and then, depending on your interests, search for the listed resources for additional in-depth information that would help you to answer the case study. Case Introduction: Internet Cafe in China On June 9, 2009, the People's Republic of China's Ministry of Industry and Information Technology (MIIT) issued a directive stating that, starting July 1, 2009, all computers sold in Green Dam Girl China must include Green Dam Youth Escort software, an internet filtering program that restricts access to objectionable material using a combination of keyword search restrictions and content filtering. There is concern that the software may be used by the government to monitor all internet…arrow_forwardComputing on the cloud is often regarded as a means to save overall costs associated with computing and to promote "green computing" (environmental friendly). What explanations have you come up with for why this is the case? Could you perhaps clarify why you disagree with my opinion so strongly?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning