bus210_appendix_e - companies and countries....

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Axia College Material Appendix E Hardware/Software Components In your own words, describe the following hardware/software components Legacy systems An old, technology computer system, or application program that continues to be used, typically because it still functions for the users needs. Mainframe computers Powerful computers used mainly by large organizations for critical applications typically bulk data and large collective files Microprocessors Multipurpose, programmable, clock-driven, register-based electronic device that accepts binary data (1’s & 0’s-computer language) as input PCs Also Known as Personal Computer’s, used to create many word-processing documents and spreadsheets Network computers A main component of IT hardware, a computer with minimal memory, disk storage and processor power designed to connect to a network especially the internet. World Wide Web and Internet A way for computers to connect and network across various
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: companies and countries. Internet-computer hardware such as mainframes, servers, PC’s and the electronic network switches or routers, fiber optic cables, telephone lines, and wireless technology that connect them into a global network. Wired and wireless broadband technology Ethernet (wired) communication technology transmitting between computers at speeds of 10 and 100million bits per second using coaxial or fiber-optic cables Wireless uses new technology known as 3G wireless technology. PC software Software that runs a variety of programs and functions within a personal computer. Networking software Software that networks one company to another-including their mainframe, servers, PCs, laptops and PDAs Computer security software Software that is used to protect a computer, network or set of severs from being compromised or damaged. Software such as a firewall. BUS 210...
View Full Document

This note was uploaded on 03/17/2012 for the course XBIS 219 taught by Professor Hann during the Spring '10 term at University of Phoenix.

Ask a homework question - tutors are online