4.1 COMMON TECHNOLOGY COMPONENTS (ISACA) Flashcards
Computer-system hardware components are interdependent components that perform specific functions and can be classified
as either processing or input/output.
The central component of a computer is
the central processing unit (CPU).
Computers may:
- Have the CPU on a single chip (microprocessors)
- Have more than one CPU (multi-processor)
- Contain multiple CPUs on a single chip (multi-core processors)
The CPU consists of
(1) an arithmetic logic unit (ALU),
(2) a control unit and
(3) an internal memory.
The control unit contains
electrical circuits that control/direct all operations in the computer system.
The ALU
performs mathematical and logical operations.
The internal memory (i.e., CPU
registers) is used for
processing transactions.
Other key components of a computer include:
- Motherboard
- Random access memory (RAM)
- Read-only memory (ROM)
- Permanent storage devices (hard disk drive or solid-state drive [SSD])
- A power supply unity
An SSD is a
nonvolatile storage device that stores persistent data on solid-state flash memory.
(SSDs have no moving components and, therefore, require less energy. This distinguishes them from hard disk drives, which contain spinning disks and movable read/write heads.)
The input/output (I/O) components are used to
pass instructions/information to the computer and to display or record the output generated by the computer.
Some components, such as the ________ and _________, are input-only devices, while others, such as the touch screen, are both input and output devices.
keyboard
mouse,
________ are an example of an output-only device.
PRINTERS
Computers can be categorized according to several criteria—mainly their
(1) processing power,
(2) size and
(3) architecture
Although increased innovation, productivity and services offer benefits, IoT users also risks _______ and ________, among others.
(1) data leakage
(2) privacy issues
Print servers
Businesses of all sizes require that printing capability be made available to users across multiple sites and domains. Generally, a network printer is configured based on where the printer is physically located and who within the organization needs to use it. Print servers allow businesses to consolidate printing resources for cost savings
File servers
File servers provide for organization wide access to files and programs. Document repositories can be centralized to a few locations within the organization and controlled with an access-control matrix.
Group collaboration and document management are easier when a document repository is used, rather than dispersed storage across multiple workstations.
Application (program) servers
Application servers typically host the software programs that provide application access to client computers, including processing the application business logic and communication with the application’s database. Consolidation of applications and licenses in servers enables centralized management and a more secure environment.
Web servers
Web servers provide information and services to external customers and internal employees through web pages. They are normally
accessed by their uniform resource locators (URLs).
Supercomputers
Very large and expensive computers with the highest processing speed, designed to be used for specialized purposes or fields that require extensive processing power (e.g., complex mathematical or logical calculations). They are typically dedicated to a few specific specialized system or application programs.
Mainframes
Large, general-purpose computers that are made to share their processing power and facilities with thousands of internal or external users. Mainframes accomplish this by executing a large variety of tasks almost simultaneously. The range of capabilities of these computers is extensive. A mainframe computer often has its own proprietary OS that can support background (batch) and real- time (online) programs operating parallel applications. Mainframes have traditionally been the main data processing and data warehousing resource of large organizations and, as such, have long been protected by a number of the early security and control tools.