How To Build Your Own Computer - Term Paper Example

Extract of sample
How To Build Your Own Computer

For basic operation, minimum hardware configuration is required but for some special purposes hardware must be selected accordingly. This paper contains the procedure of building your computer according to one’s own requirement. How to Build Your Own Computer A personal computer is not only utilized to surf the internet or check email but it is vastly used for other purposes like creating different software, run various programs and for maintain office documents and collecting information. Software is incomplete without hardware and in computers processor is the brain and heart of the system. Some people use a personal computer to play various games. A personal computer contains many parts that help run the processor and perform other functions. Processor and some other hardware components are mounted on a motherboard. All the hardware components are interfaced but utilizing a motherboard. A simple computer has a central processing unit (CPU) also known as processor, a random access memory (RAM), hard disk drive (HDD), compact disk drives (CD ROM) and DVD ROMs. Keyboard, mouse, scanners, camera and microphone are the inputs whereas monitor, printer and speaker are the output devices of a computer (Kitchen Table Computer ,2004). ...
Download paper

Summary

How to Build Your Own Computer No: Date: University: Abstract Custom built computers are essential in determining the usage of a person and to provide a user satisfaction. Hardware components that are used to build a PC must be selected according to use…
Author : altenwerthalver
Download 2

Related Essays

Computer game
Computers have become inevitable for human beings since they assist man in almost all aspects of his daily routine and his life if previewed overall. Whether it is work or leisure computers have been part of man's every unit time of life he spends since the last decade. While on one hand computers are mainly used to lessen man's workload and to increase perfection and accuracy in tasks, on the other hand they are a source of pleasure and entertainment. The latter is provided by social networking, listening to music, watching videos and playing computer games, just to mention a few. This...
20 pages (5020 words) Term Paper
How Popular Forms of Written Communications in Information Technology can be Improved?
The forms of written communications in information technology can be improved through genres of writing, writing styles, and collaboration strategies, because business aims and issues, have the capacity to be affected by written communication. Introduction There are many types of written communication utilized within business. Companies utilize written communication to inculcate employees on company guiding principles, let customers know about goods, as well as services, and to explain to investors of business strategies. The answer to writing effectual company communication is by tailoring...
5 pages (1255 words) Research Paper
the Role of Computer Technology in the human race
This ability to compute large amounts of data within very less time provided the basis of conducting analysis and comprehensive overall views of scenarios. Thus, computing assisted man immensely and was able to put to maximum use all the sources that were at hand to him. Literally speaking, Computer technology refers to the process of planning, constructing, designing and implementing a computer system. Since the basic meaning of ‘compute’ is calculate thus computing something was calculating it The History of computer technology can roughly be traced back to the year 1940 in which the...
8 pages (2008 words) Research Paper
HOW CAN MORAL RESPONSIBILITY BE ASCRIBED TO COMPUTER SYSTEMS?
Aside from this, a computer system is only helpful if its functions well and with ample amount of security. By this, it has a system that works the way it is as it is expected to work that way and be much reliable (Bace, 2000, p.29; Forester and Morrison, 1993). In other words, a computer system is created to maximise its benefits. We can actually see this happening now. Below are some actual observations we can associate with a computer system and its various benefits it offers to the humanity. Today, wherever we go, we always encounter highly systematic and computerized services, gadgets and...
6 pages (1506 words) Research Proposal
Computer Security
The network also makes it possible to share resources like printers and hard drives. This therefore reduces costs for of having to buy these resources. Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture. In this aspect the server will be installed in a data center with the server of the server program. Three-tier architecture has various layers with various functions. 3-tier architecture. The 3-tier client/server architecture was introduced to eradicate the problems that were associated with 2-tier...
4 pages (1004 words) Essay
Computer Security
In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order to execute such a strategy. Computer users’ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their...
30 pages (7530 words) Essay
Computer Hacker
This paper approves that the question of computer hacking, and computer hacking and ethics remain paramount in the present IT generation. Ethics is an aspect, which individuals develop over time; and ethics involves good behavior, which are mainly aimed at improving, and not harming others. In the world of computers and technology, ethics has become an important aspect. In this light, some computer hackers, who hack for fun, have claimed that they hurt no one by “just looking around,” and therefore, their practice should be considered ethical, and nor criminal. ...
6 pages (1506 words) Research Paper
Got a tricky question? Receive an answer from students like you! Try us!