Computerised systems, Basic Computer Science

Assignment Help:

Computerised Systems : You would have realized by now that computing systems are most useful for manipulating information. Any organisation and management of information basically involves 3 steps:

1. Information input

2. Information processing

3. Information output.

Information is usually in the form of data. Can you think of items which could form the data in a laboratory setup?

Data could be any of the following: information about stocks, equipment, finances, personnel, technical data, student records etc. You could add more to this list according to your own situation. This data is normally stored, processed or analyzed and then we get final results based on it. Sorting information fed into the computer is one of the most important operations it performs. The computer is able to arrange similar data items in a particular order, be it, numerical, alphabetical or some other sequence. On command the computer can compare any two data items and determine which the next one in that sequence is.

A collection of similar data is known as a file and each item is a record. In a file on students for example, each record contains data about one student such as the registration number, name, date of birth etc. of a student and sorting can be done according to the type of required information.

Once data has been sorted it is stored internally on the hard disc of the computer or on a floppy or a CD and can be printed out on paper. This information in a computer can be logically organised into files with separate records within files and individual items within records. When files are arranged in a database, each record contains identification labels known as keys. A key could be a code number, a name or perhaps data. When looking for particular data, the computer calls up each item from memory and checks to see if it contains the suitable key. Therefore, when a key is entered into a record, the computer scans its memory and displays that record.


Related Discussions:- Computerised systems

Write short notes on joint fiction reserve, QUESTION (i) Write short no...

QUESTION (i) Write short notes on each of the following: a) Shelf reading b) Joint Fiction Reserve c) London and South-Eastern Library Region d) Document access

Backup storage, Backup Storage: Back up (backing) storage, also termed...

Backup Storage: Back up (backing) storage, also termed external storage, is used to hold programs and data which are read into internal storage when required. The most common

Data communication & net centric computing, Suppose there are exactly five ...

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

#title.flow chart., akrenda club has just opened their jym and pools servic...

akrenda club has just opened their jym and pools services. They need a system that can keep record of total sales of each. The club has silver and gold members. The silver members

Unix fork program help, Will someone be able to help me with this I have tw...

Will someone be able to help me with this I have two text files that I can send. I am confused, is someone looking at this or is it still waiting to be assigned? this is the code

Flow decomposition technique to list the cycles, QUESTION (a) Consider ...

QUESTION (a) Consider the graph below, use the Flow Decomposition technique to list the cycles and paths produced.                                                (b) Pr

ASSIGNMENTS, A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP...

A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP OF THE STAIRS AND ANOTHER AT THE BOTTOM OF STAIRS

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Programming Project 1, Programming Project You will implement 2 algorithms...

Programming Project You will implement 2 algorithms to solve the single source shortest paths problem, Bellman-Ford Algorithm and Dijkstra''s algorithm Allowed programming languag

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd