Beruflich Dokumente
Kultur Dokumente
Hardware
A PC stands for personal computer which is
designed for use in the home, as it has a
smaller size and is easier to use than a regular
computer; which refers to huge computers in
the 1940s. Some old computers used light
bulbs which worked as transistors which had
to be constantly changed.
Some people will remember the first computers they used being a
calculator. The first microprocessor invented by Intel in 1971 was
responsible for this. Before that, people used mechanical calculators
which didn’t require batteries or solar power.
The first PC was made by technology company IBM, called the IBM PC 5150. It was released in
1981. In the olden days, the only way to get a graphical interface
up was to insert a floppy disk which would execute a program
such as Microsoft Word or Microsoft Flight Simulator. Nowadays
we have Microsoft Windows instead of a command prompt on a
black screen.
A computer is made up of various parts. There is the processor which determines how fast the
computer is. Intel and AMD make computer processors, and Intel processors are more popular due
to the global Intel Inside campaign which gave the company a lot of trust. Intel Celeron was followed
by Intel Pentium then Intel Core Duo came out when dual core processors came out. Intel Core Duo
got followed by Intel Core 2. The number after the word Core refers to the amount of processors the
processor has in total. Solo means 1. There is now Intel Core 2 Quad which is very expensive and has
4 processors. Most people don’t really need 4 processors.
Another thing which determines how fast a computer is RAM. RAM stands for
Random Access Memory and it is where all data is stored before it is
saved. Each time you open a computer program, megabytes of RAM
is used to store the data the program needs which does not get saved
onto the hard drive. For example, a calculator, which does not save
data onto the hard drive, saves all the data it needs to access such as
the previous result or what to add onto the RAM. RAM can be
By Adisa Nicholson
Technology in Health and Social Care Services Page 2
A modem is something which a phone line socket is inserted into, and then plugged
into a computer in order for an internet connection to take place. This is why, when
dial-up internet was around, the phone would have a weird sound once picked up.
Nowadays, people have two phone lines or two separate cables so broadband users can
use their phone when online. Despite this, telecoms still charge a BT line rental with
broadband internet.
Keyboard
Mouse
Printer
A printer takes what is shown on the screen onto paper. There are
different types of printers. A daisy wheel printer is the printer used
on a typewriter where only preset characters can be printed.
By Adisa Nicholson
Technology in Health and Social Care Services Page 3
technologies were used in the past, and the dots could be seen if a person held the paper really
close to their eyes.
Scanner
Photocopier
A photocopier works in the same way a printer and scanner does. Whatever image is
scanned, gets printed out, hence the name photocopier. It converts optical data into digital
data to be printed out.
CD
A CD stands for Compact Disk and replaced the floppy disk. It uses
optical (light) data. It was developed by Sony and Philips and stores
700MB or 80 minutes as an audio cd. It is the successor of the
Laserdisk which isn’t remembered. But to most people, it replaced
the magnetic floppy disk which had a maximum capacity of 1.5MB.
By Adisa Nicholson
Technology in Health and Social Care Services Page 4
Antivirus,
Norton Internet antispyware
Security 2009 and firewall 23.49 1 =SUM(C7*D7)
Grand Total =SUM(E2:E7)
By Adisa Nicholson
Technology in Health and Social Care Services Page 5
Emails
An email is basically a domain name which allows people to send messages to each other. The
messages are stored on the internet, which are read on the internet. Once deleted, it deletes of the
internet. When sending emails, it is like using Internet Explorer to access a website or submit a form.
Diagnostic Applications
By Adisa Nicholson
Technology in Health and Social Care Services Page 6
Interactive Applications
An interactive application uses multimedia (audio, images, and video), to provide feedback on the
actions that a computer user does once they have submitted a command with the keyboard of
mouse. Skype is a good example of such an application.
Word Processor
A word processor allows someone to create text documents by typing using the keyboard. Word
processing software’s biggest advantage is the ability to edit text without tip-ex, rubbing out or
crossing out; and the fact that the formatting of the text can easily be changed.
Spreadsheet
For example, for the PC Word example, I made sure that when
certain cells were edited, the percent off, and saved column
had their values changed.
Databases
The database program within the Microsoft Office 2007 suite is called Microsoft Access. A database
program does not have the autosum feature for performing mathematical calculations. The main
advantage of a database program such as Microsoft Access is the ability to perform database
queries. The biggest disadvantage and turn-off for Access is that sql databases, particularly mysql
cannot be imported or exported. This makes phpmyadmin a better alternative.
By Adisa Nicholson
Technology in Health and Social Care Services Page 7
Internet
Searching the internet
When using a search engine to find information, it is important to make sure the webpage is a
reliable source of information. Wikipedia is such a reliable source as all information found on each
page is referenced.
Security
For a safe computer an anti-virus program is needed in order to detect, quarantine or remove
malicious programming on the computer designed to do it harm. Because of the rise of a type of
malicious software which logs each keystroke and window opened in order for a hacker to obtain
passwords, the term spyware was coined. So modern anti-virus programs now include anti-spyware
as well.
A firewall is also essential to ensure that hackers do not have permission to use your internet
connection for whatever means that is. For example, a DDOS attack.
References
http://www.computerhope.com/issues/ch000984.htm
http://en.wikipedia.org/wiki/Z3_(computer)
http://www.vintage-computer.com/ancient.shtml
http://digitize.textfiles.com/items/1982-ibm-personal-computer/
http://lowendmac.com/orchard/06/ibm-pc-5150-origin.html
http://www.vintage-computer.com/my_collection.shtml
http://www.computerhope.com/issues/ch000984.htm
http://en.wikipedia.org/wiki/Compact_Disc
http://en.wikipedia.org/wiki/CD-ROM
http://computer.howstuffworks.com/fingerprint-scanner2.htm
http://en.wikipedia.org/wiki/Intel_Core
http://en.wikipedia.org/wiki/Compact_Disc
http://en.wikipedia.org/wiki/Laserdisc
By Adisa Nicholson