Computerised systems, Basic Computer Science

Assignment Help:

Computerised Systems : You would have realized by now that computing systems are most useful for manipulating information. Any organisation and management of information basically involves 3 steps:

1. Information input

2. Information processing

3. Information output.

Information is usually in the form of data. Can you think of items which could form the data in a laboratory setup?

Data could be any of the following: information about stocks, equipment, finances, personnel, technical data, student records etc. You could add more to this list according to your own situation. This data is normally stored, processed or analyzed and then we get final results based on it. Sorting information fed into the computer is one of the most important operations it performs. The computer is able to arrange similar data items in a particular order, be it, numerical, alphabetical or some other sequence. On command the computer can compare any two data items and determine which the next one in that sequence is.

A collection of similar data is known as a file and each item is a record. In a file on students for example, each record contains data about one student such as the registration number, name, date of birth etc. of a student and sorting can be done according to the type of required information.

Once data has been sorted it is stored internally on the hard disc of the computer or on a floppy or a CD and can be printed out on paper. This information in a computer can be logically organised into files with separate records within files and individual items within records. When files are arranged in a database, each record contains identification labels known as keys. A key could be a code number, a name or perhaps data. When looking for particular data, the computer calls up each item from memory and checks to see if it contains the suitable key. Therefore, when a key is entered into a record, the computer scans its memory and displays that record.


Related Discussions:- Computerised systems

Network control, Network Control, Engineering and Management Network co...

Network Control, Engineering and Management Network control in this sense involves traffic management, and the engineering of the networks to support varying traffic loads. In

Description of external hardware interruptions, External interruptions are...

External interruptions are produced by peripheral devices, for example keyboards, printers, communication cards, etc. They are also produced by coprocessors. It is not achievable t

Hotel database, Create a database,show all ojectives and give a fruitful in...

Create a database,show all ojectives and give a fruitful introduction and also state how it will be implemented

Compiled language, Compiled Language:   An additional program called a...

Compiled Language:   An additional program called a compiler translates a program written in a programming language; into a new file that does not require any other program to

How to Open a FCB files?, Opening files 0FH function is used to open an F...

Opening files 0FH function is used to open an FCB file the 21H interruption. The element, the name and extension of the file must be initialized previous to opening it. The DX regi

Cai, #whatis cai?and its pit fallsquestion..

#whatis cai?and its pit fallsquestion..

Explain kinematics modeling in virtual reality, Question 1 How can you cre...

Question 1 How can you create surface with 3D Scanner in geometric modeling? Question 2 Explain kinematics modeling in virtual reality Question 3 Describe object hierarc

Accessing other computers, Accessing Other Computers The advanced netw...

Accessing Other Computers The advanced networking features of Windows combined with the easy to use user interface make the task of sharing information with other computers/us

The elif Statement, The elif statement permits you to check multiple expres...

The elif statement permits you to check multiple expressions for truth value and execute a block of code the moment one of the conditions estimates to true. similar to the else, th

Explain fdma and tdma concepts, Question 1 Explain Wireless Protocol Requi...

Question 1 Explain Wireless Protocol Requirements and also explain in brief medium access control protocol Question 2 Explain FDMA and TDMA concepts Question 3 Exp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd