Premium Essay

Computer Differences

In: Computers and Technology

Submitted By alextmpepereki
Words 867
Pages 4
9/29/2014

Difference Between Computer and Calculator
Difference Between ● ● ● ● ● ● AA

HOME

VACANCIES

SUBMIT ARTICLE

ABOUT

CONTACT US

Search...

and

Search...

GO

Technology

Science & Nature

Public

People

Life Style

Language

Health

Education

Countries

Business

Automobile

Search
Home > Technology > Electronics > Computers > Computer and Calculator Compared

Subscribe

Posts

Comments

You can subscribe by RSS or Email to receive the latest news and breaking stories. Enter your email... Sign up

Difference Between Computer and Calculator
Posted on Feb 25th, 2011 | By olivia
Recommend on Google

Computer vs Calculator Computers and calculators are similar in the sense that both are calculating devices. But what is the difference between a computer and a calculator? Before the advent of computers, calculators were the tools that were made use of by the students to do computation while solving math problems. Not that they are not used these days, in fact, by the time you would switch on your computer, you would have completed the operation on the hand held device known as calculator. Modern calculators are electronically powered either by dry cell batteries or solar cells. During nineties, there was a calculator in every student’s pocket to aid and assist him in carrying out calculations involved in math problems. With modern computers having a built in calculator to carry on basic math operations, calculators have all but gone from households today. We know that a calculator can work only with numbers. But so can a computer. Modern calculators are extremely fast in carrying out complex calculations. But so are computers. Then what is the difference between the two? Simply put, calculators can carry only one function at a time. Even when you need to solve a small problem, you need to press a…...

Similar Documents

Premium Essay

Computers

...Computer Instructions, aka Programs Using the information in the Lectures (Computer Instructions, aka Programs) presentation, answer the following: •Name and describe the only language that computers understand and explain how the instructions that people write for computers get into that form Computers only understand one language and that is the machine language (binary code). This type of language is represented in a two digit sequence zero (0) or one (1). Computers use this machine language to represent every task that they perform by means of electrical current that go through switches (capacitors). If a switch has current it means that the switch is “ON” in machine language this will be represented as the number “one”. If there is no current going through the switch then it is considered to be “OFF” and represented in binary code as the number “zero”. Now, the way people communicate with computers is not directly by the language that the computer understands (machine language), but instead a set of instructions have to be written in a different language that specializes in writing programs such as C++ or Visual Basic. These types of languages at the same time have to be translated into machine language either through compilers or interpreters. Compilers translate all the source codes (C++, Visual Basic, etc. language) in a program to machine language before it’s executed. Then after that the compiled program (in this case machine language) is executed by...

Words: 322 - Pages: 2

Premium Essay

Computers

...Computers types I, Computer: Definition A computer is a machine that can be programmed to manipulate symbols. Its principal characteristics are: § It responds to a specific set of instructions in a well-defined manner. § It can execute a prerecorded list of instructions (a program). § It can quickly store and retrieve large amounts of data. Therefore computers can perform complex and repetitive procedures quickly, precisely and reliably. Modern computers are electronic and digital. The actual machinery (wires, transistors, and circuits) is called hardware; the instructions and data are called software. All general-purpose computers require the following hardware components: § Central processing unit (CPU): The heart of the computer, this is the component that actually executes instructions organized in programs ("software") which tell the computer what to do. § Memory (fast, expensive, short-term memory): Enables a computer to store, at least temporarily, data, programs, and intermediate results. § Mass storage device (slower, cheaper, long-term memory): Allows a computer to permanently retain large amounts of data and programs between jobs. Common mass storage devices include disk drives and tape drives. § Input device: Usually a keyboard and mouse, the input device is the conduit through which data and instructions enter a computer. § Output device: A display screen, printer, or other device that lets you see what the computer has accomplished. In addition to these......

Words: 2089 - Pages: 9

Free Essay

Computers

...Computers Computers are complex machines comprised of two key areas. Do you know what they are? The answer is hardware and software. Computer hardware is the physical components that you can touch and feel. Computer software is programs that run on the hardware. A lot of people may not know the difference between them. It might be best to tell the difference between them and how they work together. Computer hardware is made up of the keyboard, mouse, monitor, central processing unit (CPU), scanners and printers. You use the keyboard and mouse to manipulate the data you want to enter into the computer. The CPU is used to control the computer and process the operating system along with the programs you wish to run. The monitor is used to display the information the CPU processes, also the information can also be printed out on a printer, and scanners are used to take a piece of paper and copy it onto the computer. Without these components the software you want to run will not be able to. In order for your computer to run efficiently and effectively, you have to have the CPU, monitor, keyboard and mouse. A printer and/or scanner is good to have but not essential. In other words, if you are missing a keyboard or mouse, the computer will still start up but you will not be able to input any data, but if you are missing a printer it is not a big deal. You can still input your data just not be able to print it for other people to read. Computer software can be...

Words: 673 - Pages: 3

Premium Essay

Computer

...Introduction:- Computer is an electronic device which can take input from the user and process this input data and if need, store data or information on storage devices and give output on output devices. It follow the instructions us it is which we input. It takes input through Keyboard, mouse, etc and then it processes the input data and give output on display screen and store data if need. Desktop Computer:- Mostly called personal computer (PC), design to fit completely on a typical desk of office or home. It mainly comes with a monitor, a minitower or horizontal casing. Today, mostly Casing contains processor, hard disk in gigabytes, built-in modem, LAN port, USB ports and CD-ROM. Over the past few years. CPU processing speed has been increasing processing speed can be increase by adding capable RAM, capable BUS, high processor which have high processing cycle, hence more heat is also produced we use heat sinks and fans for the removal of heat from the computer as higher temperature can cause severe damage to the computer, fans are noisy and aren’t much effective so the new trend is liquid cooling. It’s just like a radiator installed for cooling, a liquid is circulated in the heat sink attached to the processor heat is transferred from the processor to the liquid is then transferred to the radiator the liquid is cooled down there and then again circulated to the heat sink. It’s less noisy as compared to fan as high speed processor clocked at higher speed need......

Words: 1247 - Pages: 5

Premium Essay

Computer

...Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is an......

Words: 47755 - Pages: 192

Premium Essay

Computer

... THE HISTORY OF COMPUTER One of the earliest machines designed to assist people in calculations was the abacus which is still being used some 5000 years after its invention. In 1642 Blaise Pascal (a famous French mathematician) invented an adding machine based on mechanical gears in which numbers were represented by the cogs on the wheels. Englishman, Charles Babbage, invented in the 1830's a "Difference Engine" made out of brass and pewter rods and gears, and also designed a further device which he called an "Analytical Engine". His design contained the five key characteristics of modern computers:- 1. An input device 2. Storage for numbers waiting to be processed 3. A processor or number calculator 4. A unit to control the task and the sequence of its calculations 5. An output device Augusta Ada Byron (later Countess of Lovelace) was an associate of Babbage who has become known as the first computer programmer. An American, Herman Hollerith, developed (around 1890) the first electrically driven device. It utilised punched cards and metal rods which passed through the holes to close an electrical circuit and thus cause a counter to advance. This machine was able to complete the calculation of the 1890 U.S. census in 6 weeks compared with 7 1/2 years for the 1880 census which was manually counted. In 1936 Howard Aiken of Harvard University convinced Thomas Watson of IBM to invest $1 million in the development of an electromechanical version of Babbage's......

Words: 1597 - Pages: 7

Premium Essay

Iywhat Is the Defining Difference Between Computer Sinformation Ecurity and Security

...Week 1, Chapter 1 03/23/2013 1. What is the defining difference between computer sinformation ecurity and security? Information security protects the data, computer security protects the hardware and network security protects the interconnectivity of the computers (Indika, 2011). I do believe that there is a clear distinction between each area but if you not in an IT state of mind like myself when working in a nursing environment as a result then, no, these areas will most likely mean the same thing as in the computer that is protected. Yes, I do believe that each area requires a slight difference in knowledge. Starting with the least: Computer security is having password protection, not leaving passwords visible, and just securing any external devices. Information security is learning how to encrypt and decrypt information, and making backup copies. Reference Indika (2011). “Difference between Network Security and Information Security” Retrieved on 03/23/2014 from http://www.differencebetween.com/difference-between-network-security-and-vs- information-security/ 2. Why can we argue that information security is really an application of social science? In my opinion, information security is an application of social science because most of the information security breaches are not technical in nature but social. A variety of technical scams from a year or so ago like phishing and the Nigerian scam are purely social in nature. 3. A globally...

Words: 425 - Pages: 2

Premium Essay

Computer

...CHAPTER 1 INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Introduction Modern civilization has become so complicated and sophisticated that to survive one has to be competitive. This compels people to keep themselves informed of all types of happening in the society. And this in turn entails the need for an infrastructure of information. This is the point where information technology or IT becomes most important, as it is the infrastructure that allows us to get information accurately and in time. Before we define information technology, it is important to understand the notion of Data, Information, Technology, and Knowledge. In everyday conversation, people use the terms data and information interchangeably. However, some computer professional make a distinction between the two terms. Data It is the words, numbers, letters, symbol, sound, video and graphics that describe people, events, things and ideas. It is raw facts about people, objects, and events that have little or no meaning. It is the raw material used to create useful information. It becomes information when you use it as the basis for initiating some action or for making a decision. Information It is defined as the words, numbers, letters, symbol, sound, video and graphics used as the basis for human action or decisions. It is data that have been processed and presented in a form suitable for human interpretation, often with the purpose of revealing trends or patterns that can be used in decision-making. It is data...

Words: 12773 - Pages: 52

Premium Essay

Computers

...The History of Computers From primitive abaci to lab tops and calculators, the computer has evolved through time to become the essential part of our technocratic society. The development of the computer has shaped the way technology and science is viewed in different cultures around the world. The connotation of what a computer is nowadays brings to mind a monitor, keyboard, processor and its other electronic components; however, that is not how things have always been. From the Chinese using abaci to count, to the Druids' usage of stones to follow the seasonal changes, to the Europeans using Pascalines and calculators to work out mathematical problems the concept of the computer has been around for hundreds of years (Hoyle). Therefore, the history of computers is important to observe not only for the influence it brought to our culture, but the progress it has made through time. The history of modern computers has been influenced by the earlier advancement of primordial technology. The abacus developed in circa 500 B.C for example, used pebbles, rocks, beads, or shells to keep track of the counters numbers. Furthermore, "the abacus was man's first attempt at automating the counting process" (Hoyle). In addition, the Pascaline, invented and built by a French philosopher and mathematician Blaise Pascal, was the first mathematical adding machine (Long 54). The Pascaline was a gear-driven machine that allowed the user to calculate answers without doing arithmetic (Hoyle).......

Words: 803 - Pages: 4

Free Essay

Computer

...Computer The word'computer ' is an old word that has changed its meaning several times in the last few centuries.The Techencyclopedia(2003) defines computer as " a general purpose machine that processes data according to a set of instructions that are stored internally either temorarily or permanently" Computer history The trem history means past events.It indicates the gradual development of computers.Here we will discuss how this extraordinary machine has reached of it's apex. In the begining............................... The history of computers starts out about 2000 years ago, at the birth of the 'abacus' a wooden rack holding two horizontal wires with breads strung on them.Just like our present computer,abacus also considered a digit as a singal or codeo and processed the calculation. Blasie Pascal ists usually credited to building the first digital computer in 1942.It added numbers to help his father.In 1671,Gottofried Wilhelm Von Leibniz invented a computer that was built in 1694.It could add,and, after changing somethings around,multiply. Charles Babbage: A serious of very intersting developement in computer was started in Cambridge,England,by Charles Babbage, a mathmatics proffessor.In 1982,Babbge realized that many lng calculations,espically those need to make mathematical tabes ,were really a series of predictable actions that were constantly repated.From this he suspected that it......

Words: 995 - Pages: 4

Free Essay

Computers

...NT1110: ELIAS GONZALES_MODULE1_LAB.DOC ELIAS GONZALES IKHLAS ABDULSAID NT1110: COMPUTER STRUCTURE LOGIC_V1.0 WEEK 1 SHORT ANSWER The operating system is the part that allows you to communicate with computer hardware in an interactive way. Without it you would not be able to tell the computer to do anything and it would not have any instructions to follow. That is why the operating system is a very important part. The operating system is generally a part of a larger network controlled by servers and other devices. There are three types of operating systems and they are Windows, Mac OS, and Linux. Windows, Mac OS, and Linux all function the same but are used and structured differently. Windows is regarded as the most user-friendly operating system available but compared to Mac OS and Linux it is much more at risk for security threats. Windows is currently being used by 80-90% of all computers and has a large hardware support. Although windows sound’s good it is also not good on security such as viruses, spyware, malware, gradual performance decay, and BSOD (Blue Screen of Death). Mac OS is based on Darwin and is less capable of getting viruses because of its design (UNIX) in which it is safer than windows. Mac OS is the proprietary operating system and can only be run on systems built by apple. Page 1 of 2 ...

Words: 422 - Pages: 2

Premium Essay

Computers

...In: Computers and Technology Computers Sergio Malone Chapter 1 Check Your Understanding Which of the following statements accurately describe differences between a LAN and a WAN? (Choose two) Companies can use a WAN to connect remote locations, and a LAN can make a local connection in a building D. Only WANs require a CSU/DSU to be used on the ends of the cable. Network professionals belong to organizations that plan and define standards used in networking. Which of the following are recognized industry organizations? (Choose two) A. IETF C. ISO D. EIA F. ITU Which of the following are true about a router? (Choose three) A. Routers enable different IP networks or IP subnets to communicate with each other. C. Path selection is one of the main functions of a router E. Routers have a central processing unit and memory. Which of the following are main components of a router? (Choose three) A. ROM B. Flash memory E. RAM Which of the following statements describe the function of RAM in a router? (Choose two) C. RAM stores the current configuration information. E. RAM stores routing tables for the router. Which of the following statements are true about DTE? (Choose two) C. DTE usually resides on the customer’s premises D. DTE is an acronym for data terminal equipment. Which of the following statements are true about DCE? (Choose two) B. DCE provides clocking to the DTE. C. DCE is an acronym for data circuit-terminating......

Words: 456 - Pages: 2

Free Essay

Computer

...A proxy server is a computer that acts as an intermediary between the users computer and the Internet. It allows client computers to make indirect network connections to other network services. If use proxy server, client computers will first connect to the proxy server, requesting some resources like web pages, games, videos, mp3, e-books, any other resources which are available from various servers over Internet. As soon as getting such request, the proxy server will seek for the resources from the cache in its local hard disk. If the resources have been cached before, the proxy server will return them to the client computers. If not cached, it will connect to the relevant servers and request the resources on behalf of the client computers. Then it caches resources from the remote servers, and returns subsequent requests for the same content directly Functions of a proxy server * Help improve web performance by storing a copy of frequently used webpages * Help improve security by filtering out some web content and malicious software * Content filtering * Spying * To keep machines behind it anonymous (mainly for security). * To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server. * To apply access policy to network services or content, e.g. to block undesired sites. * To log / audit usage, i.e. to provide company employee Internet usage reporting. * To bypass security/ parental...

Words: 691 - Pages: 3

Premium Essay

Difference

...organizing patient’s medical records. To make sure information is complete and accurate and ensures all the necessary forms are complete and signed. HIM department review patient records for many reasons such as audits, to determine trends, to respond to or resolve billing or legal issues. Research and education is a reason for medical record review. 3. Why is the billing process important? The medical billing process makes sure that all parties in healthcare-doctors, patient, and insurance company- are paid and credited properly. The process makes sure that the doctor gets paid, either by the insurance company or by the patient. Everyone involved must fulfill important responsibilities in order for the doctor to get paid. 4. State the difference between the CMS-1500 and UB-04(CMS-1450)? UB-04 claim form is inpatient stay longer than 24 hours in a medical facility. CMS-1500 is for outpatient visits that are same day discharge or less than 24 hours. CMS-1450 is another term for UB-04 claim form....

Words: 323 - Pages: 2

Premium Essay

Computers

...ACKNOWLEDGEMENT I’m happy and thankful that I finish this researchwork,with laborOf love.I dedicated first to our lord,to my parents Mrs. andMr..,to our vey own teachers of kapayapaan.I also like to extend my gratitude to my fellow friend I’vemet here . DEDICATION I would like to dedicate this work for my lovingfriends here in kapayapaan and those students engaging in thiscurricular activities orhobbies that they haven’t stop it.To be not addicted,butto be generousin using computer in right way. TABLE OF CONTENTS I.Title page II.Approval Sheet III.Acknowledgement IV.Dedication V.Chapter I a.Introduction b.Statement of the problem c.Objectives d.Significant of the study VI.Chapter II a.Definition of terms b.Computer addiction c.Questionaire VII.Chater III a.Conclusion b.Recommendation c.Bibliography OBJECTIVES This research work has the aim to know theimportantsof computer and the discourages that it bring to one of us.The purpose of gaining knowledge I using this ournew technology. Researcher BIBLIOGRAPHY • Clinical Psychiatry News (Letter to Editor), February 1997 • Harvard Mental Health Letter, January 1999 • Psychiatric Times, August 1998 REFERENCES Based on no particular authority, or advice, butsimply other people's experiences and the reviews onlineI'd recommend looking at the Intel Core2Quad Q6600. It'sgetting quite old considering the number of CPUs thathave been released since, but it overclocks incrediblywell and will......

Words: 1045 - Pages: 5

2010 ve Öncesi | Cole Sprouse | John Simm