Computer software

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 49 of 50 - About 500 Essays
  • Improved Essays

    For my senior project, I decided to challenge myself by creating a computer program with the coding language Python. The main challenge presented in this project was that I had no previous coding experience and would have to essentially learn Python from scratch. After a period of research and with the help and guidance of several real-life engineers and Mr. Logsdon (the ECP advisor). I made my ultimate goal to create a digital home assistant using a Raspberry Pi. Following the steps of the…

    • 581 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    1. Introduction In today’s life computer and internet has become a basic need of life. They are the mediator of our life. One shares information, store information through internet. Now a day’s internet is a back bone of the society. One can use internet from anywhere and anytime and is easily accessible. The growing dependency on internet world is termed as cyber world. The augmentation in the usage of internet has enabled an increase in the volume of cybercrime activities because there is no…

    • 1830 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    History of operating systems COMPUTER OPERATING SYSTEMS (OSes) present a collection of capabilities necessary along with seeing that used by almost all application DEALS having a LAPTOP OR COMPUTER, plus the back links was needed to take care of along with synchronize processing products. Regarding the first personal computers, without key method, each software necessary the full elements spec to operate the right way along with attain usual obligations, as well as unique owners intended for…

    • 2317 Words
    • 10 Pages
    Superior Essays
  • Great Essays

    understanding human behaviour that draws on concepts fundamentals to computer science. Computational thinking must be a fundament part of the way people think and understand the world. Computational thinking is also creating and making use of different levels of abstraction as well as being able to understand problems and solve them more effectively. Decomposition: Decomposition is one of the cornerstones when it comes to computer science. Decomposition is breaking down a problem or system…

    • 1172 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    ITT-116 Course Analysis

    • 292 Words
    • 2 Pages

    The Primary program I am enrolled in is to obtain a BA in information technology. The majority of the courses I am required to take are considered core courses, I have completed most of the prerequisites already. The courses are geared towards the IT field, such as ITT-116 and ITT-270. The ITT-116 course will help me obtain a better understanding of how the networks work. While the ITT-270 course will educate me on how to install, configure, operate, and troubleshoot routing and switched…

    • 292 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    actually going on. Everytime you log on to the world wide web, you are risking your computer to numerous viruses, spyware, and adware programs. Many people dont realize that over ninety percent of computers today are infected with some form of virus or spyware. It is usually to late for people to do anything by the time they realize they have been infected by some malicious computer disease. By then they have to go a computer repair place and shell out big bucks to fix whatever problem may have…

    • 522 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    or even other facility employees who do not need the information in performing their job duties. Employees should not seek out sensitive information. Additionally, computer systems should be used in a manner that protects the confidentiality, integrity, and availability of electronic data. Individuals are responsible for all computer activity that occurs under their login and should not share with others. Individuals should log out or secure their workstation whenever they leave it so others…

    • 1479 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    in Elementary School is beneficial; however, students are spending more time behind a computer screen and less time interacting in the classroom. We will discuss the privacy rights of a minor, if the students are benefiting academically, and how the students are interacting socially to see how technology currently affects students. Google has offered to all schools free access to their word processing software packages. They have made their laptop, the Chromebook, more affordable for parents to…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Secure Computer Security

    • 1115 Words
    • 4 Pages

    their house unlocked when they left for a week’s vacation? You keep your personal belongings out of others reach by locking them up or hiding them in a safe place. Computer security is important to an Information system to ensure the Confidentiality, Integrity, and availability is not compromised. There are many ways to secure a computer based information system. The most important way to secure the system is to physically secure it. When securing a system it is advantageous to use layers of…

    • 1115 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The continuing technological revolution in communications and information exchange over the past years has led to a growth in a new form of crime, cybercrime. Hence, criminals across the globe have invented various ways to use computer technology for theft, fraud as well as harassment. According to Holder and Jaishankar (2011, cited in Tiganoaia, 2013), cybercrime is defined as “an offence that is committed against individuals or groups of individuals with a criminal motive to intentionally…

    • 1246 Words
    • 5 Pages
    Superior Essays
  • Page 1 42 43 44 45 46 47 48 49 50