Tech Topic Connections

The tech topic that I have selected is “How Computers Operate”. Over the course of time I took a course online that introduced me to the process of how the network operates. A computer is a collection of hardware and software components that help the user complete many different tasks.  The network works through the operation of the Open Systems Interconnect (OSI) Model.  This is a Seven layered model that operates the network which is installed on the computer. Overall “How Computers Operate” connects to the fundamentals of information technology covered in this course.

Information Technology is the use of computers and just all around knowing how they function. Technology is advancing everyday and it's just going to continue to advance. It is important to be able to maintain and troubleshoot computers and their networks, systems and databases. On the other hand, Computer Science is more about the arctic of things. It refers to designing and building computers and computer programs.

The Hardware components of a computer are quite simple. It is a computer component or delivery system that stores and runs the written instructions provided by the software. Overall The hardware component is relied on by the computer because without the hardware, there would be no way to run the commands sent by the software. The function of a modern system is to receive, collect, and store data. This is relevant in how computers operate because it takes information from one place then stores it in another. Finally, after completing the processing, it outputs the results. 

The differences between the programming languages is that only some may require a host, and the other may require execution. The different languages that I have been using throughout the TEC 101 course are Python, Machine, Assembly and HIgh level language. Each of these programming languages come into play in different scenarios. For instance Python Language would be most effectively used while using java script or things like it to create things such as websites. On the other hand, Machine Language would be most effective while trying to print a form off of the computer and connecting to a printer. The Assembly Language Program language creates instructions to assemble expected procedures. Lastly, High level Language, for this program language, I would say that someone is operating a machine. Instead of relying solely on technology, humans have more of an impact. Programing execution methods is to program in the computer to start it to run. All in all the operating of a computer relies and these different forms of programming.

The role that application software plays with regards to my topic of how computers operate. This application allows you to perform tasks on the computer. For instance things like playing games, listening to music are all functions of the application software.  The system software controls and manages the entirety of computer operations. 

The basic concept of database and database management is that it serves as an interface between end user and a database. Allowing to perform tasks while operating a computer. Network architecture is the design of a computer network. It is the structural and logical layout of a network. The management portion of the network is a system that executes applications that monitors and manages devices. People are unaware of the benefits of network security and its contribution to computer operation. This manages and detects unusual or unauthorized access and also consists of multiple policies to catch any interference. Nevertheless the operation of a computer relies on all of these functions and more. I feel as if the scholarly sources that I used upon my completion of this blog really gave me insight on how a computer operates.

References

Berger, A. S. (2005). Hardware and computer organization. [electronic resource] : the software perspective. Elsevier.

Peterson, L. L., & Davie, B. S. (2007). Computer networks. [electronic resource] : a systems approach (4th ed.). Morgan Kaufmann.

Comments

Popular posts from this blog

Network Security