Computer essay

Filter filter
Sort by filter
8 samples is found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

Computer Games

There are a number of research work conducted to investigate several effects that playing computer games brings about in schools. Some of these researches have clearly shown that there are positive results linked to the playing of computer games and the children studying in school while others have typically have a contradicting idea in response […]

Advanced Database

Introduction An advanced database is involved in gathering of data that is planned so that it can be easily retrieved, accomplished and reorganised as well. The advanced technology has greatly evolved from peer to peer, peer to server and from server to cloud base system. However the advanced database system has different pros and cons […]

Have doubts how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started

OSI Reference Model

JANN VINCENT PAUL C. LAGMAY BSIT-1A Open System Interconnection (OSI) The Open System Interconnection Reference Model or OSI Reference Model or OSI Model is essentially a conceptual description for layered communications and computer network protocol design. It was created as part of the Open Systems Interconnection or OSI initiative. In its most fundamental form, it […]

A Computer Virus

A computer virus is a computer program that can copy itself[1] and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some […]

Computer law and privacy at work

Report to D’Ausecours Board 31st May 2006 Re: Acquisition of Security Control – Issues and Recommendations 1) Confidential Information Given the that the greatest value of SC lies in the ability of its employees to innovate and the quality and commercial potential of the resultant product, it is disturbing to learn that none of the […]

Lab Exercise: Computer Systems Architecture

Lab Exercise 2. 03: Recognizing External Connections Is it possible to plug any cable into the wrong connector? If so, which one(s)? What do you think would happen if you plugged something into the wrong connector? Answer- Yes, the mouse and keyboard connectors. If they plug into the wrong connector, the device will not work. […]

Busboy and Waitress

Megan Corvette Ward English 101 1/26/10 The View from a Waitress at a Truck Stop I am a waitress; I work at the Flying J Country Market Restaurant in McCammon, ID. I have worked there for about two and a half years. My duties are to take peoples orders for food and drinks, serve it […]

Random Number Table

Random number tables have been used in statistics for tasks such as selected random samples. This was much more effective than manually selecting the random samples (with dice, cards, etc. ). Nowadays, tables of random numbers have been replaced by computational random number generators. Tables of random numbers have the desired properties no matter how chosen from the table: by row, […]