StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Historical Information for Minicomputer - Thesis Example

Cite this document
Summary
Historical Information about Minicomputers Before going into the discussion regarding different facts related to minicomputers, let us get a better understanding of what minicomputer actually is. Tatum (n.d.) states, “Minicomputers are computers that are somewhere in between a microcomputer and a mainframe computer”…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Historical Information for Minicomputer
Read Text Preview

Extract of sample "Historical Information for Minicomputer"

Historical Information about Minicomputers Before going into the discussion regarding different facts related to minicomputers, let us get a better understanding of what minicomputer actually is. Tatum (n.d.) states, “Minicomputers are computers that are somewhere in between a microcomputer and a mainframe computer”. Minicomputers gained popularity in the 1960s when computer engineers designed 12-bit machine from DEC, which was relatively low cost and small as compared to competitors. Small business owners, who did not have enough money to buy mainframes, used minicomputers because at that time minicomputers had the ability to perform somewhat similar tasks as mainframes could do and at relatively low cost.

In recent history, minicomputers have been in use as servers of large networks. Thompson (n.d.) asserts, “Many servers operate under the same concept because programs are used to store and manipulate data much like mini computers do”. Some of the main tasks performed by minicomputers include word processing, internet browsing, database management, spreadsheet calculations, playing music and video games, and editing photographs (Carpenter, n.d.). Having discussed some history and usage of minicomputers, let us now discuss some important facts related to the minicomputers. A. Standalone System One of the main points regarding minicomputers is that they are generally standalone systems.

Carpenter (n.d.) asserts, “Minicomputers, often called midrange servers, are standalone computer systems supporting more than one terminal or workstation”. Standalone systems provide many benefits to the users. These standalone systems provide facility to the users to perform big functions at a low cost. Another benefit of having a minicomputer is its inherent flexibility in performing different kinds of functions. Decentralized Computing “Databases could be operated in either centralized or distributed computing environment” (Umezurike, 2009).

Decentralized computing refers to the concept of allocating all hardware and software resources to autonomous computers that perform a common task instead of giving all controls to a remote centralized location as in case of centralized computing. Decentralized computing is a modernized form of computing in which all computer systems have the ability to perform different functions independently. “Distributed computing utilizes a network of many computers, each accomplishing a portion of an overall task” (McGuigan, n.d.).

Some of the main benefits of decentralized systems include greater capacity, availability of resources, and reduced communication costs. Thin Client Computing Thin client computing, which is also termed as server-based computing, refers to the computer systems, which rely on servers to perform all tasks. “A thin client is a computer that functions mainly as a terminal” (Dimapasok, 2011). Thin client computers only act as interface while the servers are there to do all work. Peterson (2011) states, “A thin client is unable to perform many functions on its own”.

Thin client computing is very cost effective because it is only used for display purposes and for operating keyboard and mouse while the servers do the main work. Some of the main benefits of thin client computing include lower cost of ownership and maintenance, remote access to different applications, high reliability, better data security, and simplified use. Smith (2005) states, “Thin client computing can be a great way to stretch limited computing budgets and simplify system administration headaches” (p. 272). B.

Security Privacy Privacy is one of the main issues for any individual doing any kind of work on a computer. One can maintain privacy by setting difficult passwords on the windows so that other people cannot use the computer. Disclosure of Data Disclosure of data is the voluntary sharing of some information under certain circumstances. For example, employees disclose some information on application letters as requested by the employers. Data Access Data access is the activity, which is related to retrieving of data stored in the database.

One needs to apply proper mechanisms to authorize only relevant people to access data in order to ensure optimum security. Secure Data Deletion Secure data deletion is a method to delete sensitive data securely. For windows, PGP Desktop and Heidi Eraser can be used to delete the data securely. Key Management Key management is the collection of procedures involved in generation, storage, and replacement of encryption keys. Appropriate key management mechanisms are very necessary for maintaining the security of cryptosystem.

Audit Rights Audit right enables separate accountings of similar transactions. With this clause in a contract, a person becomes able to crosscheck any specific record. C. Security Protection Security protection is a big concern for every individual. Let us discuss government policies and privacy protection, which are two factors of security protection. Government Regulation/Policies and Privacy Protection It is the responsibility of every government to make policies to ensure protection of personal data.

The Data Protection Act 1998 is a United Kingdom government’s law, which is related to the secure processing of data. The Act requires all companies and people to protect important information by avoiding unnecessary disclosure of information. References Carpenter, J. (n.d.). Microcomputer Vs. Minicomputer. Retrieved from http://www.ehow.com/about_5521633_microcomputer-vs-minicomputer.html Dimapasok, J. (2011). A Thin Client – Fat On Features. Retrieved from http://ezinearticles.com/?A-Thin-Client---Fat-On-Features&id=6038434 McGuigan, B. (n.d.). What is Distributed Computing?. Retrieved from http://www.wisegeek.com/what-is-distributed-computing.

htm Petersen, J. (2011). What is a Thin Client?. Retrieved from http://www.wisegeek.com/what-is-a-thin-client.htm Smith, R. (2005). Linux in a Windows World. Sebastopol, CA: O’Reilly Media, Inc. Tatum, M. (n.d.). What is a Minicomputer?. Retrieved from http://www.wisegeek.com/what-is-a-minicomputer.htm Thompson, G. (n.d.). What Are Mini Computers?. Retrieved from http://www.ehow.com/facts_5120528_mini-computers.html Umezurike, A. (2009). Centralized Versus Distributed Computing in Organizations.

Retrieved from http://ezinearticles.com/?Centralized-Versus-Distributed-Computing-in-Organizations&id=2894639

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Historical Information for Minicomputer Thesis Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1423383-historical-information-for-minicomputer
(Historical Information for Minicomputer Thesis Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/finance-accounting/1423383-historical-information-for-minicomputer.
“Historical Information for Minicomputer Thesis Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/finance-accounting/1423383-historical-information-for-minicomputer.
  • Cited: 0 times

CHECK THESE SAMPLES OF Historical Information for Minicomputer

History and Impact of Computing

History and Impact of Computing First Name, Last Name College/University Date History and Impact of Computing Introduction: This paper addresses the answers of key questions asked in the context of the computer history and important role of leaderships of the Apple, and other computer manufacturing companies....
5 Pages (1250 words) Essay

Hotel Information Systems in MAI Systems Corporation

In 1983, the company introduced its MAI 8000, a super-minicomputer nearly as powerful as a mainframe computer, which was proficient enough of servicing up to 96 users at one time.... MAI Systems Corporation dba Hotel information Systems is a provider of enterprise wide solutions including software solutions, mid-range, multi-user computer systems and their system software, other network products, and application software designed for several specific industries....
7 Pages (1750 words) Case Study

Evolution of Computers

From the room sized computers in the ‘60s and ‘70s to the net books of today which the user can carry anywhere in a small carry case and use it to connect to vast amounts of information and computing power, the pace of change has been tremendous.... Computer technology has seen a remarkable change in the last century....
7 Pages (1750 words) Essay

A Historical Perspective - MAI Systems Corporation dba Hotel Information Systems

 This study "A Historical Perspective - MAI Systems Corporation dba Hotel information Systems" discusses the property management software and services hospitality industry.... hellip;  MAI Systems Corporation dba Hotel information Systems is a provider of enterprise-wide solutions including software solutions, mid-range, multi-user computer systems, and system software, other network products, and application software designed for several specific industries....
7 Pages (1750 words) Case Study

Historical Information for Midrange Computers

By the year 2002, client-server platforms and midrange The paper "historical information for Midrange Computers" is a delightful example of a thesis on information technology.... (Newman, 2010; Berson, 1996) Disclosure of Data: information in storage or during transmission through network resources may be disclosed by hacking, spyware, etc.... “The E-Government Act [Public Law 107-347] passed by the 107th Congress and signed into law by the President on December 2002 recognized the importance of information security to the economic and national security interests of the United States” (HG....
2 Pages (500 words) Thesis

Digital Culture/Revolution

From the work, it is clear that these changes apply to the industrial revolution that resulted in the emergence of industrial cities, enhance communication in the society as well as advocates openness and freedom to information.... The linking of the introduction of the digitalization with mathematics expounds on how the author of the Digital Revolution in Wikipedia had some information regarding the history of digitalization (Wikipedia, 2014, paragraph 1 "Brief History")....
8 Pages (2000 words) Assignment

How has Hacking and the Motivation of Attackers Evolved

However, besides expert enthusiasts, the term also refers to malicious meddlers into computers or systems for criminal objectives like theft of confidential information.... This paper describes the original definition of a hacker as “a person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary”....
12 Pages (3000 words) Research Paper

Installation of LIS at AL Ahmad Trading Company

"Installation of LIS at AL Ahmad Trading Company" paper states that the installation of a logistics information system should enable users from sales and purchasing departments to browse the online product catalog, selling prices, and the cost of the products.... hellip; The trading company is growing tremendously and has three branches in the United Arab Emirates....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us