Computerised systems, Basic Computer Science

Assignment Help:

Computerised Systems : You would have realized by now that computing systems are most useful for manipulating information. Any organisation and management of information basically involves 3 steps:

1. Information input

2. Information processing

3. Information output.

Information is usually in the form of data. Can you think of items which could form the data in a laboratory setup?

Data could be any of the following: information about stocks, equipment, finances, personnel, technical data, student records etc. You could add more to this list according to your own situation. This data is normally stored, processed or analyzed and then we get final results based on it. Sorting information fed into the computer is one of the most important operations it performs. The computer is able to arrange similar data items in a particular order, be it, numerical, alphabetical or some other sequence. On command the computer can compare any two data items and determine which the next one in that sequence is.

A collection of similar data is known as a file and each item is a record. In a file on students for example, each record contains data about one student such as the registration number, name, date of birth etc. of a student and sorting can be done according to the type of required information.

Once data has been sorted it is stored internally on the hard disc of the computer or on a floppy or a CD and can be printed out on paper. This information in a computer can be logically organised into files with separate records within files and individual items within records. When files are arranged in a database, each record contains identification labels known as keys. A key could be a code number, a name or perhaps data. When looking for particular data, the computer calls up each item from memory and checks to see if it contains the suitable key. Therefore, when a key is entered into a record, the computer scans its memory and displays that record.


Related Discussions:- Computerised systems

Web Design Project, Hello - What is the turn around time for a 6 page websi...

Hello - What is the turn around time for a 6 page website.

Define virtualization, Question 1 Define virtualization. Discuss the benef...

Question 1 Define virtualization. Discuss the benefits of virtualization. Discuss the benefits of server virtualization Question 2 What is para virtualization? How para vi

Write the steps for applying animations, Question Write the steps for a...

Question Write the steps for applying animations. Prepare a presentation of 5 slides in a creative for any topic in your semester (research methods/Business strategy/Financial

Magnetic core memory, MAGNETIC CORE MEMORY: This type of memory is used...

MAGNETIC CORE MEMORY: This type of memory is used extensively in airborne digital systems, although integrated circuits are being developed with most modern aircraft systems.

Applications software, Applications Software: General aspects on appli...

Applications Software: General aspects on applications software. Applications software is the program that allow the user to get the required work done. In other words, applic

Input devices, Input Devices Keyboard Keyboard is the dev...

Input Devices Keyboard Keyboard is the device through which the commands, instructions required for execution of a program is entered. It consists of a number of

Artificial intelligence, Artificial Intelligence Artificial Intelligen...

Artificial Intelligence Artificial Intelligence is difficult science to explain, as it has fuzzy borders with  computer science, mathematics,  philosophy, physics,  psychology

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

Programmable rom (prom) , PROGRAMMABLE ROM (PROM): The user can program...

PROGRAMMABLE ROM (PROM): The user can program a PROM after purchase.  Each memory bit element in the PROM contains a nichrome or silicon link that acts as a fuse.  The user can

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd