Skip to main content

Posts

Newer Post or latest post

Describe the points on the architecture of software engineering?

Describe the points on the architecture of software engineering? Application software engineering is a difficult subject to learn and needs more hard work for development for new application projects for the targeted users on the internet or offline users in different types of departments. The distribution after development of an application is also struggling but it solves the problem specifically at the department or company or unique users who need application software. There are so many steps to follow to develop and find the new project of application software engineering for the end user. Such as:- research from the search engine sites, social media data analysis and collecting data set, forums discussion, survey for specific application needs, collect resource requirements and user requirements then follow different types of software development are the following explained points below. The application development needs the programming language to design the code and implement o...
Recent posts

the computer has an in built memory where it can store a large amount of data

State the points on the computer memory built-in to the computer system? The built-in memory device means the storage device is attached to the motherboard of the desktop computer system inside the CPU cabinet. The computer has various types of memory devices that have their uses categorised by the task and category of memory device such as:- temporary memory is used for storing data temporarily and permanent memory storage data permanently on the free space of the storage device of the computer system. The primary memory and secondary memory is necessary to apply and install into the computer system to provide the files to store the file into the free space where the primary memory is used to provide the temporary memory space to store for temporary files that can be removed after turn off and then on the computer or restart the computer system. The secondary memory storage device is used to store the file permanently into the specific address of the file in the computer storage devic...

How to protect your computer from unknown access users on the operating system?

How to protect your computer from unknown access users on the operating system? The user can protect their computer system through a logical level in the operating system which has been installed into the storage device of the computer system. The user can protect the computer system to access all functions and services from the unknown users using the user account protection which is a very important first step to protect the computer system. The operating system has a feature of controlling the user account using the features of the security layer applied on the user account to apply the username and password setup to the user who knows the username and password then the user can access the user account created in the operating system on the computer system. The user can use the security layer on the user account even the reserve account that provided from the functional key on the keyboard it can be F1 to F12 depends on the key function to automatically provide the reserve account t...

Describe the controlling operation in a computer system?

Describe the controlling operation in a computer system? The controlling operation in a computer system refers to the Central Processing Unit's (CPU) ability to manage and coordinate the flow of data, instructions, and tasks within the system. This operation involves: - Fetching instructions from memory - Decoding instructions into machine language - Executing instructions, such as arithmetic, logic, and data transfer operations - Storing results in memory or output devices - Managing input/output (I/O) operations - Handling interrupts and exceptions - Regulating data transfer between different parts of the system The CPU's control unit oversees these operations, ensuring that instructions are executed in the correct order and that data is processed accurately and efficiently. The operating system provides the controlling system of hardware input functionality to take the input values from the different types of keys of the keyboard input device is used to change the input valu...