Associate Level Material Essay

|Legacy systems |A bequest system describes the IT system that is presently in topographic point. This means that | | |any hardware of package that was antecedently in topographic point up until now if a bequest system. | |Mainframe computing machines |The chief frame is the cardinal hub of about all companies storage and processing. | |Microprocessors |This is describes as a “computer on a chip” It rivaled the mainframe all though it was| | |much less powerful. Microprocessors paved the manner for standalone computing machines. | |PCs |This stands for Personal Computer which means that it is a stand-alone computing machine that | | |has it’s ain power supply and processor. | |Network computing machines |Network computing machines means a series ( more than one ) of computing machines that can pass on to | | |each other by directing and having information across different types of webs | | |whether it is a L. A. N or even a M. A. N | |World Wide Web and Internet |The cyberspace is made of 1000000s of waiters. chief frames. Personal computers. switches and routers to| | |keep the communicating traveling along from device to device. The universe broad web is made | | |up of similar points but besides includes web sites hosted on waiters. | |Wired and wireless broadband engineering |Wired Broadband is when you have your computing machine hardwired to an Ethernet port via a | | |CAT5 overseas telegram. Wireless Broadband uses an aircard and can link to HotSpots. Routers | | |and Access Points to make the web through wireless frequences. | |PC package |An illustration of Personal computer Software is Windows. Adobe. certain games that require a download. | |Networking package |Networking package is used to assist link. or web different companies or people | | |together. Oracle is the 2nd largest package shaper and holds the industry criterion. | |Computer security package |With networking and the WWW going what it is today. it is a helpful tool. However. | | |since everything is networked together by computing machines. that means that people can acquire | | |into your web and/or computing machine and steal valueable information. To assist work out this. | | |things like firewalls were created. |