StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Term Paper example - How To Build Your Own Computer

Undergraduate
Term Paper
Information Technology
Pages 6 (1506 words)
Download 2
How to Build Your Own Computer No: Date: University: Abstract Custom built computers are essential in determining the usage of a person and to provide a user satisfaction. Hardware components that are used to build a PC must be selected according to use…

Extract of sample

For basic operation, minimum hardware configuration is required but for some special purposes hardware must be selected accordingly. This paper contains the procedure of building your computer according to one’s own requirement. How to Build Your Own Computer A personal computer is not only utilized to surf the internet or check email but it is vastly used for other purposes like creating different software, run various programs and for maintain office documents and collecting information. Software is incomplete without hardware and in computers processor is the brain and heart of the system. Some people use a personal computer to play various games. A personal computer contains many parts that help run the processor and perform other functions. Processor and some other hardware components are mounted on a motherboard. All the hardware components are interfaced but utilizing a motherboard. A simple computer has a central processing unit (CPU) also known as processor, a random access memory (RAM), hard disk drive (HDD), compact disk drives (CD ROM) and DVD ROMs. Keyboard, mouse, scanners, camera and microphone are the inputs whereas monitor, printer and speaker are the output devices of a computer (Kitchen Table Computer ,2004). ...
Download paper
Not exactly what you need?

Related papers

Computer game
Computers have become inevitable for human beings since they assist man in almost all aspects of his daily routine and his life if previewed overall. Whether it is work or leisure computers have been part of man's every unit time of life he spends since the last decade. While on one hand computers are mainly used to lessen man's workload and to increase perfection and accuracy in tasks, on the…
20 pages (5020 words)
How Popular Forms of Written Communications in Information Technology can be Improved?
The forms of written communications in information technology can be improved through genres of writing, writing styles, and collaboration strategies, because business aims and issues, have the capacity to be affected by written communication. Introduction There are many types of written communication utilized within business. Companies utilize written communication to inculcate employees on…
5 pages (1255 words)
the Role of Computer Technology in the human race
This ability to compute large amounts of data within very less time provided the basis of conducting analysis and comprehensive overall views of scenarios. Thus, computing assisted man immensely and was able to put to maximum use all the sources that were at hand to him. Literally speaking, Computer technology refers to the process of planning, constructing, designing and implementing a computer…
8 pages (2008 words)
HOW CAN MORAL RESPONSIBILITY BE ASCRIBED TO COMPUTER SYSTEMS?
Aside from this, a computer system is only helpful if its functions well and with ample amount of security. By this, it has a system that works the way it is as it is expected to work that way and be much reliable (Bace, 2000, p.29; Forester and Morrison, 1993). In other words, a computer system is created to maximise its benefits. We can actually see this happening now. Below are some actual…
6 pages (1506 words)
Computer Security
The network also makes it possible to share resources like printers and hard drives. This therefore reduces costs for of having to buy these resources. Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture. In this aspect the server will be installed in a data center with the server of the server program. Three-tier…
4 pages (1004 words)
Computer Security
In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order…
30 pages (7530 words)
Computer Hacker
This paper approves that the question of computer hacking, and computer hacking and ethics remain paramount in the present IT generation. Ethics is an aspect, which individuals develop over time; and ethics involves good behavior, which are mainly aimed at improving, and not harming others. In the world of computers and technology, ethics has become an important aspect. In this light, some…
6 pages (1506 words)