Laptops are one of the most common appliances owned by college students for various reasons. The modern day laptop is small but powerful, allowing students to use it in class to take notes, bring it to a study session, or use it in their room for minor gaming. A laptop can be slid into a book bag and can be used anywhere, at least as long as the battery lasts. A laptop is also ideal for those whom lack or do not which to have to plug in any wires or assemble any parts because laptops are sold as a single unit. Some slight things can be upgraded on a laptop such as hard drives or RAM, but the beauty behind laptops is they work right out of the box, and priced for the average bankrupt college student. The average laptop costs just below $500, but a decent laptop can also be purchased for as low as $200 or as high as $1200, making laptops the general go to in terms of a computer for many people.
Desktops are very common in households for their computational power, but tend to stay out of the college dorm room for various reasons. First off desktops ar...
... middle of paper ...
...hic cards for varying costs as well but if the user is a hardcore gamer or graphic artist it could beneficial to be able upgrade to a high end graphics card.
Overall desktops and laptops both have key aspects that make them useful for college students. A laptops small size and battery make it ideal for a student who likes to type up teacher lectures or work on their computer in different locations around campus or at home. Laptops also have a relatively low cost. A desktop, though stationary, is ideal for someone who needs a high level of computational power and who is decent with technology and would enjoy upgrading their computer over time. In comparison both types of computers have advantages, but for a college student who lacks money and tends not to play big games or use high level processing programs on their computer a laptop top would be the best choice.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- 1. Introduction Over the decades information and communication technologies have revolutionized our access to information and our communication bases. The increase in our dependence on internet has made information and communication systems more vulnerable to security attacks. Many regular incidents demonstrate this vulnerability, like the rapid propagation of sophisticated malwares, denial of service attacks on socio-economical organizations ,business and government portals and the against the power grid system.... [tags: Security, Computer security, Risk]
1121 words (3.2 pages)
- The Internet has emerged as the most rapidity adopted communication medium in history. The Internet by design is de-centralized, inexpensive, uncensored, and accessible from anywhere in the globe. Bill Gates contends that the Internet is first step along the “Information Superhighway”, which will ultimately create a “global village” that will allow for a more symmetrically distribution of information. The United States, which invented most of the underlying technologies for the Internet, leads the rest of the world in embracing the Internet as measuring by users, the number of English based web-sites, and Internet Service Providers (ISP), but also producing the hardware and software that d... [tags: essays research papers]
2716 words (7.8 pages)
- Our research group has to agree that implementation of cloud computing to PCB companies can be done within the next few years because the IT industry being used by PCB companies will drastically change as the research group knows. Most or some employees may not fully understand the concepts or even grasp the basics of cloud computing in this present era but it takes time for them to learn. Personnel of PCB companies especially upper managers would expect good results and benefits both financial and technical from cloud computing in this fast moving years run by society depending on tons of IT platforms.... [tags: Information Technology]
1817 words (5.2 pages)
- Throughout the year’s technology have been modernized and so as the security systems must be well updated in the computer world to protect against cyber-attacks. In addition, in this modernized era of technology they are high risks of security breaches such as data tampering, breach of confidentiality such as our passwords and personal data etc. There is a significant rise in cyber-crimes over the years and our privacy being invaded through digital data. Most of security breaches and crimes happen on the internet through the mass social media.... [tags: Computer security, Security, Information security]
843 words (2.4 pages)
- I have been interested in computer security for a while now. So that’s why I chose to research on some security and privacy issues that are challenging. For example using our cellular phones, playing games online, shopping online and even our private health data, can be invaded by unauthorized users. Therefore, in order to obtain personal data and information in which they can share to other unauthorized persons. These are threats and security issues that we face daily when using our devices and also using the internet.... [tags: Computer security, Security, Information security]
873 words (2.5 pages)
- Media could be used as the advertisement, entertainment, publicity, and many another way; media is something similar, or the same to social communication. However, in the millions of media’s concept, the concept related to new media attracted most of my attention. New media came into prominence in the mid-1990s (Mass Communication in Canada/P.16) and it contains some disadvantage and advantage; and the basic concept of the new media was quite different from the traditional mass media, one of the most important concepts in media study.... [tags: Media studies, Mass media, New media, Media]
730 words (2.1 pages)
- ABSTRACT Agile Methodology is a term I have come across more and more throughout my exposure to professionals in the IS field. Wither it be networking activities, interviews, or general conversation I repeatedly hear “Agile Methodology” in reference to system development and project management, where it is referenced as the “newest and greatest” method of development. This has made me wonder what exactly is Agile Methodology, when is it best for a development team to use Agile, why is Agile the “in” methodology, how is it implemented, and what are the results of “going agile”.... [tags: Software ]
1305 words (3.7 pages)
- It cannot be said that the era of mass communication has simply come to an end. Rather, this essay will argue that instead, the traditional ideologies of the term, mass communication, have been modified, transformed and revolutionised. The content surrounding mass communication has not changed substantially, however the way audiences are consuming it, has. Firstly, a working definition of mass communication must be established before an argument can commence. Peters and Simonson (2004) provide a definition which states that mass communication is when a message is dispersed “on a large scale, to a mass audience” (p.9).... [tags: Mass media, Media, Media studies]
1942 words (5.5 pages)
- • Star Office was created by a German company in 1984, in August 1999 Star Division was bought out by Sun. Star Office standards works well with many Linux distributions and it is free. Star Office is formally shareware and because of this it required a registration number, Sun provides a generic license, this product is very similar to the earlier version of Microsoft Office, it provides a Star Desktop that is similar to Windows 95 screen and the start button. Star Office doesn’t have the same examples and wizards as Microsoft products.... [tags: Software]
1229 words (3.5 pages)
- Selecting Proprietary, Open Source, or Free Software for Business Information Systems At first glance, the question above would probably lead you to believe that proprietary software should be the obvious choice when selecting between the different types simply because of the reference to the words most important. You could also look at the definitions of the three and be convinced that proprietary software seems to be more compelling than the rest. However, with the recent developments with software in general, I would have to agree with those that argue that open source should be the first choice for any kind of software, and that considering proprietary software should only be an option... [tags: Software Compare Contrast]
1139 words (3.3 pages)