Computer

Dream Computer

When deciding what will run my dream computer, processor-wise that is, I am reminded of a friends computer that last year, was running with two Pentium III’s, running at 650 Megahertz a piece. This year he is looking to upgrade on this design. I however, will be able to take his idea, and with money […]

Read more
computer viruses

Title Computer Viruses Thesis Statement This report on Computer Viruses will include a identification of Computer Viruses, as well as analyzation of Computer Viruses. Outline 1.Introduction a.New form of Computer Viruses. b.What a Computer Viruses is. 2.Body a.Basic Definitions b.Preventive Action c.Worms d.Human Threats e.Hackers f.Phone Phreaks g.Configuration Errors and Passwords h.Internal Threats i.Information Dissemination […]

Read more
Computer Network Systems

In the modern world where technologies are improving significantly all the time, computer network systems are widely used to provide a connection between computers or networks. Using such networking systems, different companies or departments within one organization are able to keep easily in touch on a regular basis, which makes their cooperation more effective and […]

Read more
Modern Business environment

Modern Business environment is a rapidly changing environment. Marketing, as an important aspect of modern business, need more theories and techniques support in dealing with this environment. Therefore, the appropriate application of marketing theories and techniques poses great effect on business performance.Capabilities Based Marketing is a promising approach in handling some confusing marketing problems, which […]

Read more
The computer industry

Apple computer has experienced both good and bad times as a major player in the computer industry. It has been a leader in computer technology in the past but has struggled lately in keeping pace in the rapidly developing computer industry. Developing technology and evolving computer applications have contributed to a business environment that is […]

Read more
Barriers to the timely implementation of e-prescribing

The E-prescribing concept is becoming realisable under modern healthcare initiatives however; there are notable barriers, which effect the implementation of e prescribing. This short essay aims to explore such barriers and understand the importance of such on the medical profession Definition of e-prescribing and Components of electronic prescribing Electronic prescribing involves several processes: drug ordering […]

Read more
Corporate Social Responsibility in Asia

The purpose of this assignment was to analyze on the article written by two Authors, Chapple and Moon (2005) on Corporate Social Responsibility in Asia: A Seven-Country Study of CSR Web Site Reporting. The study found the flow of description of research problem and questions supported by relevant literatures on CSR in Western Europe and […]

Read more
Software “Pegasus Mail”

“The user interface is the users’ gateway into the computer, enabling the required human-computer interaction to take place.” (Operating Systems incorporation UNIX & Windows, page 32, Colin Ritchie). Human Computer Interaction deals with the ergonomic aspects of the computer interface. The principles of HCI are of importance to the computer system designer, which means that […]

Read more
The use of ICT has changed the way in which people work

Information Technology has brought about an entire industry. Many thousands of people now make their living directly in the information Technology world. Example, Programmers, Systems Managers, Technicians, consultants, Data Processing Staff, Systems Analysts, Network Designers, Network Managers ,Web Designers and Technical Authors. Every Week Thousands of Computer-Related jobs are advertised. There are never enough people […]

Read more
The Benefits of ICT to the System

Section 1 – Life without ICTImplementing the sub-systems on to the company’s website without the use of ICT would have been very difficult, time consuming and extremely inefficient. Without the use of a spreadsheet all the calculations would have to be done separately, by calculator, this would require extensive man power and would be very […]

Read more
Defining computer viruses

In defining computer viruses Parsons and Oja wrote that the technical definition of a computer virus is a set of program instructions that attaches itself, and spreads to other files. Viruses corrupt files, destroy data, displays irritating messages, or otherwise disrupt computer operations. (185)In continuing, Parsons and Oja explained that there is a common misconception […]

Read more
ICT & Myself

My name is Peter Sutton; I am a student at King Williams College, Isle of Man. I use ICT all the time; I am woken by a digital alarm clock, my food is cooked in a digital controlled oven and I am driven to school in a computer assisted car. I also use ICT in […]

Read more
Computer Aided Learning

A. Presentation of the IssueThe applications of computers are growing rapidly, and expectations of this technology are growing at the same rate. One of the newest branches of computer application is Computer Aided Learning or CAL.Although computers and educational packages are generally in use today, Computer Aided Learning in the future will be even more […]

Read more
The Effect of Computer Games

The effect of computer games to the academic peformance of the students of Lyceum International Maritime Academy. 1. What are computer games played by the maritime students? 2. What are the effects of these computer games to the academic performance of the students? 3. What Recommendation will be drown to improve the study habits of […]

Read more
Blue Eyes Technology

Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that pan listen, talk, or even scream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions […]

Read more
Memory Management

With memory management there are certain requirements that it is intended to satisfy. Those requirements are relocation, protection, sharing, logical organization, and physical organization. As an essential part of memory management these areas will be discussed below. RelocationThe importance of relocation according to Stallings (2012), is to maximize utilization of the processor by swapping active […]

Read more
Categories of Computer Crime

Explain in detail the four common categories of computer crimes and provide at least one example for each. There are many different types of computer crime and multiple ways to categorize them. I will discuss four categories in detail to shine light on how vulnerable people are, when we choose to use a personal or […]

Read more
Technical Description of a Computer

Computers are basically all around us now and they have become part of our daily living. Not only can it perform calculations much more quickly than a person can, it can also do many complex tasks simultaneously. Thanks to the computers, they help us make the complicated jobs much easier, help us to do tasks […]

Read more
Computers in Different Spheres of Lives

A computer is an electronic device, which executes software programs. It consists of 2 parts-hardware and software. The computer processes data through input devices like mouse and keyboard. The computer displays output through output devices like color monitor and printer. The size of a computer varies considerably from very small to very big. The speed […]

Read more
Automated Payroll System for Citylane

Information technology changes at a fast phase. Many business sectors constantly upgrade their computer system in order to stay competitive. The multi-function of technology and its automated systems are important factors for a company because it can be a great help for its people. The computerized systems aim to provide greater precision, reliability and flexibility […]

Read more
Computer Security vs Precision

Data and computer systems require absolute protection against intervention or alienation. With this, the term computer security was coined, defined as the branch of information security dealing with computers. Protection may very from theft or corruption, more specifically on the preservation of availability as described in security policy. There are instances that the user requests […]

Read more
Computer and Society

Society can be defined as “a community, nation, or broad grouping of people having common traditions, institutions, and collective activities and interests. To understand the full impact of computers on society, we will first have to understand the meaning of ‘computer’. A Computer does not necessarily mean a monitor, keyboard, mouse and a CPU. A […]

Read more

Get instant access to
all materials

Become a Member