Computer Program Essays (Examples)

999+ documents containing “computer program”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Computer Programming Used at Your
Pages: 2 Words: 574


Visual Basic is an Event Driven language, which means that programs don't follow the sequential path of traditional languages such as Pascal. Instead bits and pieces of sequential code are associated with certain events such as the clicking of a button. Then when the program is run, events will occur in response to changes in the environment (such as the ticking of the computers internal clock) or by intervention from the user (such as clicking a button). When an event takes place the associated sequential code is then executed. Once this is completed the system will wait until the next event fires, and the whole process repeats (Henderson-Sellers, 2003).

One can leverage the knowledge of Visual Basic and use the Visual Basic programming environment without going through learning the scripting or manipulate HTML tags to develop a highly functional Web-based application, as one can separate designing the user interface from writing…...

mla

References

Chatzigeorgiou, a. (2003). Performance and power evaluation of C++ object-oriented programming in embedded processors. Information and Software Technology, 45, 4, 195.

Henderson-Sellers, B. (2003). Method engineering for OO systems development Association for Computing Machinery. Communications of the ACM, 46, 10, 73-74.

Essay
Career of Computer Programmer Creating
Pages: 7 Words: 3070

Second, a major benefit for many computer programmers is the option of working on a variety of very interesting and challenging projects. Often the projects require months off planning, programming and continual work to get the applications to performing at their highest possible performance levels. Third, many companies now sponsor in-house training and development seminars, with a few even having local universities come in and teach the latest techniques on programming. This is a major time-saver for programmers as it gets them more knowledge to do their jobs, and also make them more valuable in their careers for the long-term. Fourth, programming is a profession that lends itself well to individual achievement and accomplishment. For those programmers who are exceptionally good at their work, they become well-known in their fields and often get promoted. Companies also provide many conveniences to programmers to alleviate time drains on them. Google for…...

mla

References

Gul Agha (2008). COMPUTING in PERVASIVE CYBERSPACE. Association for Computing Machinery. Communications of the ACM, 51(1), 68-70. Retrieved May 14, 2008, from ABI/INFORM Global database. (Document ID: 1407575171).

Josh Bernoff, Charlene Li. 2008. Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review 49, no. 3 (April 1): 36-42.   (Accessed May 16, 2008).http://www.proquest.com 

Ryan Blitstein (2 June 2007). Engineers wanted! Will pay very well: WEB 2.0 DEVELOPERS in GREAT DEMAND. Knight Ridder Tribune Business News,1. Retrieved May 16, 2008, from ABI/INFORM Dateline database. (Document ID: 1281144381).

Roxanne E. Christ, Jeanne S. Berges, Shannon C. Trevino. 2007. Social Networking Sites: To Monitor or Not to Monitor Users and Their Content? Intellectual Property & Technology Law Journal 19, no. 7 (July 1): 13-17.

Essay
Computer Program Design What I
Pages: 6 Words: 1817


The programming design class gives the student many tools that they will need on the job, but there is much more to the design process than having the right tools. The ability to apply those tools to the situations that will arise on the job is one of the most important skills that the designer will have. However, this is not always easy to teach in the classroom. Therefore, it is important for the design student to read as many outside sources as possible. They must understand the various philosophies and approaches to the design process. They must understand the strengths and weaknesses of those approaches and how they relate to various customer projects. The computer program design student must develop the broadest knowledge base possible in order to deliver a quality product to the customer.

eferences

Din, J. & Idris, S. (2009). Object-Oriented Design Process Model. International Journal of Computer Science…...

mla

References

Din, J. & Idris, S. (2009). Object-Oriented Design Process Model. International Journal of Computer Science and Network Security. 9 (10): 71-79.

Guzman, J., Mitre, H. & Amescua, a. et al. (2010). Integration of strategic management, process improvement and quantitative measurement for managing the competitiveness of software engineering organizations. Software Quality Journal. DOI: 10.1007/s11219-

9094-7 Retrieved May 31, 2010 from http://www.springerlink.com/content/58k83507v1j7w653/?p=318712de7adb48cfa387cb4

3f1366078&pi=4

Essay
Computer Fraud and Abuse Act
Pages: 7 Words: 2541

Computer Fraud and Abuse Act
Information technology and related systems provide multiple benefits to business, government, and individual users. Databases, Internet transactions, and emails contain sensitive customers, employee and operations data that are extremely vulnerable. The following study focuses on various components of IT and related systems used for the storage of information like computers, servers, and website databases. Whilst identifying the ways the date can be compromised and exposed to abuse, the study identifies ways of protecting and enhancing their integrity.

Types of information systems that that hold data

Computers

Computers do their primary work in parts that are not visible when using them. To do this, a control center that converts data input to output must be present. All this functions are done by the central processing unit (CPU) a highly complicated set of electric circuits that intertwine to store and achieve program instructions. Most computers regardless of the size must contain…...

mla

References

Adikesavan, T.A. (2014). Management Information Systems Best Practices and Applications in Business. New Delhi: PHI Learning Pvt. Ltd.

Bradley, T. (2006). Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security: Everyone's Guide to Email, Internet, and Wireless Security. New York: Syngress

Khosrowpour M. (2006). Emerging Trends and Challenges in Information Technology Management: 2006 Information Resources Management Association International Conference, Washington, DC, USA, May 21-24, 2006 Volume 1. Washington: Idea Group Inc. (IGI)

Kim, D. & Solomon, M. (2010). Fundamentals of Information Systems Security. New York: Jones & Bartlett Learning

Essay
Computer Upgrade Board Proposal Computer
Pages: 4 Words: 1328

In setting this plan for implementation and maintenance the ultimate goal for the district within the next five years is the creation of a student-to-computer ratio of 1-1 in grades 3-12 and 3-1 for grades K-2 in accordance with developmental studies for the utilization of technology in lesson and course plans for each respective grade. Computers will be updated on an annual basis, with replacement being taken into consideration every four years. In order to maintain cost-effectiveness, leasing programs and low-cost computer programs will allow students and teachers the capacity to access more applications and content which is relevant to consumers but nearly unaffordable in many educational systems. Low-cost computer programs such as the One Laptop per Child Foundation have been developed in order to aggressively place computers in the hands of hundreds of millions of children around the world, the United States included, in order to aid students…...

mla

References

Aliasgari, M. Mojdehavar, N. And Riahinia, F. (2010). Computer-assisted instruction and student attitudes toward learning mathematics. Education, Business, and Society, 3.1: pp. 6. Web. Retrieved from: ProQuest Database.

Ames, M. And Warschauer, M. (2010). Can one laptop per child save the world's poor?

Journal of International Affairs, 64.1: pp. 33-55. Web. Retrieved from: ProQuest Database.

Carman, E., Lewis, C., Murphy, K. And Richards, J. (2005). Strengthening educational technology in schools and in pre-service teacher education: a practitioner-faculty collaborative process. Journal of Technology and Teacher Education, 13.1: pp. 125-140. Web. Retrieved from: ProQuest Database.

Essay
Computer Assisted Writing Learning Applied
Pages: 20 Words: 6823

" Shin (2006) Shin also states that the CMC literature "illustrates shifts of focus to different layers of context." Early on, research relating to CMC in language learning and teaching looked at the linguistic content of CMC text to examine how language learners could improve certain communication functions and learn linguistic figures through CMC activities (lake, 2000; Chun, 1994; Kern, 1995; Ortega, 1997; Pellettieri, 2000; Smith 2000, Sotlillo, 2000; Toyoda & Harrison, 2002, Tudini, 2003; Warschauer, 1996) Recent studies of "tellecollaborative projects have examined how language learners jointly construct the contexts of their CMC activities, as part of their focus on tensions among intercultural communication partners. (elz, 2003, 2003; Kramsch & Thorn, 2002; O'Dowd, 2003; Ware 2000, War & Kramsch, 2005) IN the study of Shin (2006) which was "informed by Ware's (2005) examination of a tellecollaborative communication project between American college students and German students" Shin (2006) looks into…...

mla

Bibliography

Introduction to Computational Linguistics (2006) Computer-Assisted Language Learning  http://www.georgetown.edu/faculty/ballc/ling361/ling361_call.html .

Lusnia, Karen B. (1000) Teaching Teachers Long-Distance: A Paradigm-Shift for the Teacher-Planner in Mexico - Applied Linguistics. Paper presented at the International Conference on Language Teacher Education.

Bakhtin, M.M. (1981). Excerpts from discourse in the novel. In M. Holquist (Ed.), The dialogic imagination: Four essays by M.M. Bakhtin. Austin, TX: University of Texas Press.

Bateson, G. (2000). Steps to an ecology of mind: Collected essays in anthropology, psychiatry, evolution, and epistemology. Chicago, IL: University Of Chicago Press.

Essay
Computer Charting's Effect on Nursing
Pages: 5 Words: 1392

(Andrews, 1985)
The study found that computer charting was well accepted by therapists. "Charge capture was reduced from a four-step manual process to a single-step computer documentation of the procedure. Computer charting was more complete and informative. Productivity increased 18%, although it remains unclear to what degree the computer was responsible." (Andrews, 1985)

In conclusion, the study determined that computer charting streamlined the process of documentation and allowed more beneficial use of clinical information. (Andrews, 1985)

In other words, the study fell in line with the later Cunningham study in that they both noted that computer involvement in various stages of health care provision via computer charting truly benefits the health care provider and the patient. In addition, it streamlines costs and eliminates costly errors.

College health systems benefit especially from computer charting, according to Carol Mulvihill, R.N.,C., CQ Editor and Director of Health Services, University of Pittsburgh at radford. She notes that…...

mla

Bibliography

Andrews, RD, et al. 1985. Computer charting: an evaluation of a respiratory care computer system. Respir Care. 1985 Aug;30(8):695-707.

Cunningham, S, et al. 1996. Comparison of nurse and computer charting of physiological variables in an intensive care unit. Int J. Clin Monit Comput. 1996 Nov;13(4):235-41.

Medinotes: 2005. Charting Plus. www.medinotes.com

Mulvihill, Carol. 1997. Advantages of computerized charting in college health. University of Pittsburgh: CQ.

Essay
Computers and Culture Using the Book Technopoly
Pages: 7 Words: 2023

computers and culture, using the book "Technopoly: The Surrender of Culture to Technology," by Neil Postman, and other resources. Specifically, it will answer the questions: How have computers and computer networks changed human thinking, behavior, and lifestyle? What has been gained? What has been lost? What are the advantages of computers in communication? In education? In entertainment? In the economy? What are the disadvantages in these areas? Is computer technology creating winners and losers, or furthering social stratification? Have we become too dependent on computers? Do computers limit social skills and physical activity to a damaging degree? Why or why not? Computers have changed our national culture and our global culture, and not always for the better. When they were first developed for the mass market, computers were meant to increase productivity and cut down on paper work. Today, computers have permeated every section of our lives, and our…...

mla

Bibliography

Berg, R. Dreyer. "Our Computational Culture: From Descartes to the Computer." ETC.: A Review of General Semantics 51.2 (1994): 123+.

Marsha Kinder, ed. Kids' Media Culture. Durham, NC: Duke University Press, 1999.

Perrolle, Judith A. "Information, Technology, and Culture." The Relevance of Culture. Ed. Morris Freilich. New York: Bergin & Garvey Publishers, 1989. 98-114.

Postman, Neil. Technopoly: The Surrender of Culture to Technology. New York, Vintage Books, 1992.

Essay
Computer Is a Device That Accepts Information
Pages: 1 Words: 333

computer is a device that accepts information in the form of digitalized data and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed. Used the right way, computers can be an enormous personal and business productivity tool for automating numerous routine tasks and increasing information storage, retrieval and exchange. Unfortunately, computers also facilitate and expand crime.
Computer crime pertains to any intentional or unintentional harm done to or with information and/or hardware that may result in losses of, or injury to, property, services, and people. Many crimes involving computers are no different from crimes without computers. Some examples include:

Using a computer and peripherals for forgery or counterfeiting is the same crime as using an old-fashioned printing press with ink.

Stealing a laptop computer with proprietary information is the same crime as stealing a briefcase that contains papers with proprietary…...

mla

Bibliography

Eder, Karen. Defining Computer Crime and Technology Misuse." Technology Studies in Education Research Portal. 23 Nov. 2003. http://lrs.ed.uiuc.edu/wp/crime/definition.htm.

Standler, Ronald B. "Computer Crime." 2002.

23 Nov. 2003.  http://www.rbs2.com/ccrime.htm .

TechTarget. 23 Nov. 2003.  http://searchwin2000.techtarget.com/sDefinition/0,sid1_gci211829,00.html .

Essay
Computers in Space Science
Pages: 5 Words: 1740

computers in space science. Specifically, it will look at the roles computers have in current space technology and how they have effected the lives of everyone in the world. Without computer technology, space science would be confined to the ground, and man's imagination. efore large-scale computing was developed, the technologies necessary to design, build, and maintain a space program simply did not exist. Computers have made it possible to explore the moon, stars, and beyond.
Computers in Space Science

Computers play an integral role in the science of space, and without them most of modern space exploration would not be possible. As the NASA report, "Computers at NASA" states, "Since the 1950's, the computer has been the main tool that has enabled scientists and engineers to visualize the next frontier and then make it a reality" (NASA). NASA employs literally thousands of computers throughout the world to monitor, design, and assimilate…...

mla

Bibliography

Author not Available. "Computers at NASA." NASA. 1994. 29 Oct. 2003.  http://www.jsc.nasa.gov/news/factsheets/computers.pdf 

Barber, Jennifer Lauren. "Close Encounters on Your Desktop." Bright Magazine. 2001. 29 Oct. 2003. http://journalism.medill.northwestern.edu/journalism/magazine/bright/brightlite/peer4.html.

Dubinski, John. "Cosmology." Canadian Institute for Theoretical Astrophysics. 26 June 1997. 29 Oct. 2003.  http://www.cita.utoronto.ca/webpages/CITA/annrep96/node20.html 

Editors. "Hubble's Computers and Automation." HubbleSite. 2003. 29 Oct. 2003.  http://hubble.stsci.edu/sci.d.tech/nuts_.and._bolts/spacecraft_systems/#comp

Essay
Computers Are Related to My Profession Computers
Pages: 6 Words: 1776

Computers Are Related to My Profession
Computers are a very important part of our world and are vital to the success of any firm. This paper will explore how computers are related to my profession as an Internet merchant. We will discuss the role that the computer plays in allowing me to perform my duties as a merchant. The discussion will also focus on the program languages and devices that are vital to my success. This technology includes Application Service Providers, a Merchant Account and Data Warehousing. I will explain how these technologies are used and why they are vital to the success of my business. First lets discuss the nature of my profession and the duties that I perform.

Nature of my Profession

As an Internet merchant I sell products and services over the World Wide Web. I have a website that allows people to purchase products using credit cards and…...

mla

Bibliography

Hayes, Ian S. "Implementing an ASP Solution." Software Magazine. Dec 2000.  http://www.findarticles.com/cf_0/m0SMG/6_20/69412619/p2/article.jhtml?term=ASP+programing+laguage 

Mccollum, Tim. "Tools For Targeting Customer Service." Nations Business. Nov 1, 1998.  http://www.findarticles.com/cf_0/m1154/1998_Nov_1/53111049/p1/article.jhtml?term=database+management 

Vignette Merchant Suite Provides Powerful Solution for Direct Sales Online to Businesses and Consumers." Business Wire. June 18, 2001.  http://www.findarticles.com/cf_0/m0EIN/2001_June_18/75609966/p1/article.jhtml?term=Online+Merchant+Accounts

Essay
Computer Training Program to Enhance
Pages: 25 Words: 6445

Similar to the suggestions offered by Gahala (2001), rody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the reputation of the trainer, the rewards available to the participants, both tangible and intangible, and the support of the administration. Traditional staff development models have required everyone to participate at the same time and in the same location creating problems such as scheduling, travel, space, and funding. intrim (2002) notes that web-delivered staff development allows teachers to log on and participate at the time of day that is best for them and at the pace they are the most comfortable with.
urke (1994) concluded that the use of effective distance education programs for K-12 staff development should be increased to supplement face-to-face in-services due to the positive evaluations of K-12 educators who participated in the electronic distance education in-service programs. However, other…...

mla

Bibliography

Bintrim, L. (2002). Redesigning professional development. Educational Leadership, 59

Blumenfeld, P.C., Marx, R.W., Soloway, E. & Krajcik, J. (1996). Learning With Peers:

From Small Group Cooperation to Collaborative Communities. Educational Researcher, 25(8), 37- 40.

Books, J., Cayer, C., Dixon, J., Wood, J. (2001). Action Research Question: What Factors Affect Teachers' Integration of Technology in Elementary Classrooms?

Essay
Computer Learning Problems Briihl D S 2001
Pages: 2 Words: 995


Kinshuk, Liu, ., & Graf, S. (2009). Coping with mismatched courses: Students' behaviour and performance in courses mismatched to their learning styles. Educational echnology Research and Development, 57(6), 739-752. Retrieved from ERIC database.

Kinshuk and Graf first establish the fact that students are often required to learn material that is not adaptive to their preferred learning style. he work then goes on to analyze how an interactive adaptive online/computer aided system could aide these students in allowing individual learning through designs that were more adaptive to learning style preference (i.e. had multiple ways of learning the same material) the work indicates that non-adaptive computer aided designs, i.e. that simply teach with one learning style are not as effective as those which offer students in mismatched courses several ways to learn material.

Sahin, a., Cermik, H., & Dogan, B. (2010). Is it "Writing on Water" or "Strike it Rich?" he experiences of prospective…...

mla

This work analyses interactive complex group learning tasks through the implementation of computer learning models. The research indicates that the computer model must be structured in a specific way to best aide the student in finding answers to complex learning tasks. The model that was most effective involved task specific step processes organized in a linear way and computer aided scripting (through chat) to help the learner answer enduring questions about the subject and the computer program, with a pre-task orientation to the system by a computer learning aide live in the computer lab, where each student worked independently on his or her own computer.

Wang, S., & Heffernan, N. (2010). Ethical issues in computer-assisted language learning: Perceptions of teachers and learners. British Journal of Educational Technology, 41(5), 796-813. Retrieved from ERIC database.

Wang and Heffernan discuss the issue of ethics as it is associated with Computer- Assisted Language Learning (CALL) as it has transitioned from stand alone formats to internet driven interactive learning. The researchers state that there has been a near complete lack of attention paid to online privacy and security in the classroom which could potentially create a demonstrative difficulty for computer aided learners and instructors as well as for the use of internet-based learning systems in general. The researchers seek to let their work serve as a starting point for a serious discussion about these issues, specific to the classroom and the industry of internet-based computer learning in general.

Essay
Computer History it Is Said
Pages: 5 Words: 1593

Computer History
It is said that before 1935, a computer was a person who was performing arithmetic calculations. During 1935 and 1945, a computer was referred to as a machine but not a person. Its definition as a modern machine tends to be based on von Neuman's concepts: a device that is capable of accepting input, processing data, storing data and producing output.

Earlier there was abacus which was used for mathematical computations. Its importance was just in aiding memory of the human who was performing the calculation. A skilled operator was capable of working on addition and subtraction problems at the speed of an individual who was equipped with a calculator but slow in division and multiplication. People always wrongly attribute abacus to China. Whereas the oldest ever existed abacus was used in 300 B.C. By the Babylonians.

Giant ENIAC machine was the first substantial computer and was invented by John W.…...

Q/A
does computers think?
Words: 524

Do Computers Think?

Defining Thought

Before delving into the question of whether computers think, it is essential to define what we mean by "thought." Thought is a complex and multifaceted process that involves various mental operations, including:

Cognition: The acquisition, storage, and retrieval of knowledge.
Reasoning: The ability to draw logical conclusions from given premises.
Problem-solving: The ability to find solutions to problems by applying known information and strategies.
Decision-making: The ability to evaluate options and select the best course of action.
Consciousness: The subjective experience of being aware of one's own thoughts, feelings, and surroundings.

Capabilities of Computers

Computers are powerful machines capable....

Q/A
How can an abstract example effectively represent complex concepts in a simplified and innovative manner?
Words: 357

An abstract example can effectively represent complex concepts in a simplified and innovative manner by distilling the key elements of the concept into a succinct and visually engaging format. By using metaphor, analogy, or visual representation, the abstract example can help the audience grasp the essence of the concept without getting bogged down in technical details or jargon.

For example, imagine trying to explain the concept of artificial intelligence (AI) to a group of non-technical individuals. Instead of diving into the intricacies of machine learning algorithms and neural networks, you could use the analogy of a computer program that learns from....

Q/A
How do mathematical foundations impact critical thinking in engineering education?
Words: 587

I. Introduction

  1. Mathematical Foundations in Engineering Education


    1. Significance of mathematical foundations in shaping engineers' critical thinking abilities

    2. Interdisciplinary nature of engineering and the role of mathematics in providing a common language for collaboration
  2. Critical Thinking: A Key Skill for Engineers


    1. Definition and characteristics of critical thinking

    2. Relevance of critical thinking in engineering problem-solving, design, and decision-making

II. Body

  1. Mathematical Foundations and Analytical Reasoning


    1. Calculus and algebra enhance problem-solving....

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now