Computers And The Internet Essays (Examples)

1000+ documents containing “computers and the internet”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Computers and the Internet E-Commerce
Pages: 7 Words: 3039

The level of integration within each of these competitors is readily apparent in their approach to developing e-commerce applications.
Proposal for Web Presence

The following is a proposal for a Web presence which will give PZE Puzzles competitive parity with each of the competitors profiled in this analysis in the short-term and provides the necessary foundation for surpassing these competitors in the long-term. Inherent in this proposal is the need for create a tight integration at the process and system level with catalog management, content management, order capture, order management and pricing systems, in addition to interprocess communication and collaboration across sales, service, and production departments as well. As a result of the high need for interprocess communication and collaboration, an Internet-based platform such as Microsoft SharePoint is highly recommended. By integrating all applications within the SharePoint platform PZE Puzzles will be able to rapidly scale across their many channels and…...

mla

References

Petras Barsauskas, Tadas Sarapovas, Aurelijus Cvilikas. 2008. The evaluation of e-commerce impact on business efficiency. Baltic Journal of Management 3, no. 1 (January 1): 71-91. (Accessed February 26, 2009).

Josh Bernoff, Charlene Li. 2008. Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review 49, no. 3 (April 1): 36-42.   (Accessed Feb urary 24, 2009).http://www.proquest.com 

Ick-Hyun Kwon, Chang Ouk Kim, Kyung Pil Kim, Choonjong Kwak.

2008. Recommendation of e-commerce sites by matching category-based buyer query and product e-catalogs. Computers in Industry 59, no. 4 (April 1): 380. (Accessed February 21, 2009).

Essay
Computers and the Internet Security
Pages: 4 Words: 1313

The goal of corporate security policies is to identify the procedures, guidelines and practices for configuring and managing security in an environment. By enforcing corporate policy, corporations can reduce their risks and show due diligence to their customers and shareholders (Importance of Corporate Security Policy, 2010).
Before making choices regarding the Information Security strategy, long or short-term, organizations need to have a sound appreciative of their sole risk profile. isk consists of a mixture of information resources that have value and vulnerabilities that are gullible. The scale of the risk is the product of the value of the information and the amount to which the susceptibility can be exploited. As long as the organization has information that has worth that information and by expansion, the organization will be susceptible to risk. The purpose of any information security control mechanism is to limit that risk to an suitable level. This is…...

mla

References

Danchev, D. (2003). Building and Implementing a Successful Information Security Policy.

Retrieved from  http://www.windowsecurity.com/pages/security-policy.pdf 

Importance of Corporate Security Policy. (2010). Retrieved from  http://securityresponse.symantec.com/avcenter/security/Content/security.articles/corp .

security.policy.html

Essay
Future of Computers and the Internet
Pages: 2 Words: 694

computers and the Internet. Specifically it will discuss the problems coming in the future of computers and the Internet. There are many challenges and problems facing the future of computers and the Internet. One is the growing number of foreign-language-based Web sites and information online, and translating that information so that users have access to it. At a symposium about the future of the Internet, Eric Schmidt said that a majority of Web content will be in Chinese in five years' time (asmus, 2009). This will be a problem for many American sites that will want to capture that market, and it could be a problem for others around the world that do not speak Chinese but need access to the information.
Chinese and other languages dominating the Web is a problem because of the challenges it presents both the Chinese Web site operators and other countries, but it is…...

mla

References

Boakye-Akyeampong, K. (2009). Community networks for developing countries. Retrieved 7 Nov. 2009 from the Public Sphere Project Web site: http://www.publicsphereproject.org/patterns/pattern.pl/public-pattern_id=12.

Osborn, D.Z. (2006). Selected proceedings of the 35th annual conference on African linguistics, ed. John Mugane et al. Somerville, MA: Cascadilla Proceedings Project, p. 86-93.

Rasmus, D. (2009). The future of information. Retrieved 7 Nov. 2009 from the Windows Live Web site:  http://future-of-work.spaces.live.com/?_c11_BlogPart_BlogPart=blogview&_c=BlogPart&partqs=cat%3DComputers%2520and%2520Internet >

Essay
Computer Addiction Causes and Potential
Pages: 3 Words: 874

This is what creates the continual need to share literally everything going on in their lives, as each post releases a significant dopamine rush (Charman-Anderson, 17, 18).
Dopamine is also the reason why the many forms of computer addiction are so difficult to treat. ith anonymity comes the opportunity to create multiple identities or personas online (Soule, 66, 67). This is what leads employees who have Internet addictions to create many different online identities, giving them ethical and moral leeway they would never give themselves. This aspect of personas and the forgiven unethicacy of conduct of personas is a key factor in online crimes committed by employees during company hours (Nykodym, Ariss, Kurtz, 82, 83). The personas of the addicted computer addicts are orchestrated for specific dopamine-driven production to fuel and feed habitual behaviors online

(Quinn 180). These strategies to ensure a steady supply of dopamine may not even be obvious…...

mla

Works Cited

Charman-Anderson, Suw. "Seeking Addiction: The Role of Dopamine in Social Media." Computer Weekly (2009): 16-23.

Neumann, Peter G. "Are Computers Addictive?" Association for Computing Machinery.Communications of the ACM 41.3 (1998): 128-135.

Nykodym, Nick, Sonny Ariss, and Katarina Kurtz. "Computer Addiction and Cyber Crime." Journal of Leadership, Accountability and Ethics (2008): 78-85. ABI/INFORM Complete. Web. 3 Dec. 2012.

Quinn, Brian. "The Medicalisation of Online Behaviour." Online Information Review 25.3 (2001): 173-80.

Essay
Internet Setup in the Home We Have
Pages: 2 Words: 660

Internet Setup in the Home
We have recently offered some of our employees the opportunity to telecommute. The tremendous convenience of telecommuting depends on an understanding how to properly set up your personal (home) computers with the Internet. This memorandum offers a simplified step-by-step guide that you can refer to when setting your Internet connection.

I understand some of you are using Microsoft Windows-based computers, while others are using Apple Mac. Furthermore, some of you use cable or DSL with a hardwire (Ethernet) cable, and others use a wireless router. Some of you may not yet have Internet service in your place of residence. Therefore, I have adapted the steps for a number of different situations. If you do not already have an ISP and have yet to purchase a Establish a Contract with an Internet Service Provider (ISP)

If you already have an ISP and Internet service, such as through your television…...

mla

References

"Internet Access and Services," (n.d). About.com. Retrieved online:  http://compnetworking.about.com/od/internetaccessbestuses/Internet_Access_and_Services.htm 

Jaebi, I. & Media, D. (n.d.). How to set up cable internet with a PC. Salon. Retrieved online: http://techtips.salon.com/set-up-cable-internet-pc-21720.html

Mitchell, B. (n.d.). Internet connection alternatives for home networks. Retrieved online:  http://compnetworking.about.com/od/homenetworking/a/homeconnection.htm

Essay
Computer Fluency Impact on a
Pages: 3 Words: 1123

As many of the world's industries are faced with increasing competitive pressure and the need to continually improve their performance, employers look to new employees with computer fluency skills as an indicator that the person also has initiative to tackle difficult learning projects and master them. Initiative is very valuable in today's labor market. When combined with computer fluency and literacy, a prospective employee can add in knowledge of a specific industry and gain a greater competitive advantage in getting a new position. This combination of factors together is what serves as the catalyst for anyone seeking a career where computer fluency is a necessary requirement.
Summary

The level of computer literacy and their level of fluency with PCs, applications, the Internet and its many applications and research tools will have a direct correlation to what they will earn over their lifetimes; this point is clear from the studies citied. In…...

mla

Francis Green, Alan Felstead, Duncan Gallie, Ying Zhou. "COMPUTERS and PAY." National Institute Economic Review no. 201 (July 1, 2007): 63-75.   (Accessed April 30, 2008).http://www.proquest.com 

Copacino, William C "Skills development -- the best defense against downsizing." Logistics Management, January 1, 1997, 42.

A www.proquest.com (Accessed April 30, 2008).

Essay
Internet in Basic Terms the
Pages: 5 Words: 1553


eferences www.questiaschool.com/PM.qst?a=o&d=113454035

Cole, C., ay, K., & Zanetis, J. (2004). Videoconferencing for K-12 Classrooms: A Program Development Guide. Eugene, or: International Society for Technology in Education. etrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=113454035

FAQs about Internet2. etrieved November 26, 2008, at http://www.internet2.edu/about/faq.html www.questiaschool.com/PM.qst?a=o&d=106217067

Goodman, P.S. (Ed.). (2002). Technology Enhanced Learning: Opportunities for Change. Mahwah, NJ: Lawrence Erlbaum Associates. etrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=106217070

Hanss T. Internet2: Building and Deploying Advanced, Networked Applications.

etrieved November 26, 2008, at http://net.educause.edu/ir/library/html/cem/cem97/cem9722.html

Internet2: About us. etrieved November 26, 2008, at http://www.internet2.edu/about/

Internet2 Announces New Initiative to Accelerate Advanced Network Application

Development. etrieved November 26, 2008, at http://www.icair.org/pr/newinit.html

Internet2 Network. etrieved November 26, 2008, at http://www.internet2.edu/network / www.questiaschool.com/PM.qst?a=o&d=106217067

eddy, ., & Goodma, P.S. (2002). Chapter 1 Technology Trends and Implications for Learning in Tertiary Institutions. In Technology Enhanced Learning: Opportunities for Change, Goodman, P.S. (Ed.) (pp. 3-20). Mahwah, NJ: Lawrence Erlbaum Associates. etrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=106217097

usso a.…...

mla

References www.questiaschool.com/PM.qst?a=o&d=113454035

Cole, C., Ray, K., & Zanetis, J. (2004). Videoconferencing for K-12 Classrooms: A Program Development Guide. Eugene, or: International Society for Technology in Education. Retrieved November 26, 2008, from Questia database:  

Essay
Internet Business Plan What Does
Pages: 15 Words: 7291

(Horticulture and the advantages of using the Internet Technology)
What are the disadvantages of conducting business, large or small, on the Internet? They may be many. However, the most important disadvantages are: it can actually create a feeling of isolation; the businessman may feel that he has become isolated. This means that he may get the feeling that the World Wide Web is faceless and emotionless, and thus the business too is isolated and inhuman, devoid of contact with the real world and other human beings. After all, humans are social creatures, and such isolation would most often lead to the development of a feeling of depression. Another disadvantage is that since the World Wide Web is such a large area to work in; it encompasses in some cases the entire globe, and there is such a large amount of information generated on the web, it becomes very difficult to…...

mla

References

Advantages of Internet Trading" Retrieved at   Accessed on 19 January, 2005http://icliverpool.icnetwork.co.uk/business/hotprospects/tm_objectid=14090017&method=full&siteid=50061&headline=advantages-of-internet-trading-name_page.html .

Beery, Tim. "The Different Types of Business Plans." Retrieved at   on 19 January, 2005http://www.bplans.com/dp/article.cfm/193Accessed 

Bucher, Has-Juergen. "Crisis Communication and the Internet, Risk and Trust in a Global Media." Retrieved at   Accessed on 19 January, 2005http://www.firstmonday.org/issues/issue7_4/bucher/ .

Communicating." Retrieved at   Accessed on 19 January, 2005http://www.sandiego.gov/public-library/pctech/tech/general/commun/1.shtml .

Essay
Internet Use in the Educational
Pages: 5 Words: 2113

"What's more, many teachers lack technical support; unlike businesses, most schools don't have an it guy down the hall to save the day when computers go haywire." (Wohl, 2001) central contemporary concern is the problem of Internet security and access to quality information. Without the necessary security measures and administrative restrictions, access to the Internet can also mean access to harmful pornographic material. These administrative procedures once again require technical expertise and time on the part of the teacher.
Another aspect that is of concern in today's online environment is that while there is a plethora of information available, this is not always of the best quality. Many teachers and institutions have banned student access to open -source sites such as Wikipedia for this reason. It is very difficult if not impossible for the teacher to monitor and check the validity and quality of the sites and sources that their…...

mla

References

Chanlin, L., & Chang, C. (2003). Web-Based Library Instruction for Promoting

Information Skills. Journal of Instructional Psychology, 30(4), 265+. Retrieved March 5, 2008, from Questia database,  http://www.questia.com .

Collis, B.A. (1996). Children and Computers in School. Mahwah, NJ: Lawrence

Erlbaum Associates.

Essay
Internet Laws
Pages: 8 Words: 3271

Internet Ethics and the consumer's private existence in an unstable regulatory environment -- untapped economic waters in a wild, wild west of identity theft and chronic consumption
hen it comes to Internet ethics, even in the absence of legal requirements, businesses must themselves self-regulate when it comes to consumer privacy. If they do not, it is likely that the government will step in to do so, as the government has done in the European Union. This will only hurt businesses economically, and do damage to the equal ethical obligation corporations owe to shareholders. Furthermore, good business sense is about trust between the consumer and the business, and this is not honored when businesses unfairly spy upon casual surfers of their websites, or use consumer data for their own profit as well as research and marketing purposes.

Americans, according to a recent poll cited by J. Hodges in the journal of the Internal…...

mla

Works Cited

Ewald, Helen. (April 1, 2003) "You're a Guaranteed Winner: Composing the You of Consumer Culture" Journal of Business Communication.

Hodges, J. (Feb 2001): No Faith in the System - consumer service shows Internet users concerned about privacy." Internal Auditor. Retrived 8 Jan 2005 at  http://www.findarticles.com/p/articles/mi_m4153/is_1_58/ai_71268466 

Kaess, Ken. (June 2004) "Emotion in Advertising." Journal of Advertising Research.

Lofton, Lynn. (October 2004) "Offices Enforce Acceptable Policies to Keep Up with Tech." Mississippi Business Journal.

Essay
Internet E-Commerce Exploring the Growth
Pages: 5 Words: 1352


A second lesson learned is that e-commerce can be used for creating a unique product based on customer requirements. Michael Dell quickly realized that his build-to-order PC business could grow much faster than his small shop in Austin, Texas would allow for. He chose to create one of the first product configurators that could be used on a website, making it a unique differentiator relative to all other PC companies selling through e-commerce channels before (Jones, et.al.). The product configurator Dell created has specifically designed to allow customers online to work at their own pace, and even abandon a product configuration midway through building it (Liu, Mackie, 292). Customers online could also mix and match accessories for the PCs first, and then their entire laptops as well. Soon, customers were creating dozens of laptops and then printing out the configurations and comparing them to see which best fit their needs…...

mla

References

Ho, S., R. Kauffman, and T. Liang. "Internet-based selling technology and e-commerce growth: a hybrid growth theory approach with cross-model inference. " Information Technology and Management 12.4 (2011): 409-420. (journal)

Kathryn Jones. "The Dell Way. " Business 2.0-1 Feb. 2003 (article)

Liu, C., and B. Mackie. "Enabling Customization through Web Development: An Iterative Study of the Dell Computer Corporation Website. " Journal of Information Systems Education 19.3 (2008): 291-300. (journal)

Newing, Rod. "Variety, the spice of life: ONLINE PRODUCT CONFIGURATION: One of the biggest challenges is bringing supply chains together to respond rapidly to customers' diverse requirements: [Surveys edition]. " Financial Times 1 Nov. 2000 (newspaper)

Essay
Computer How Soon Till
Pages: 8 Words: 3095

Moreover, it has also to be ensured that the motherboard contains expansion slots built into the board, and not built into the expansion board which plugs into the motherboard.
Memory: The memory located inside the computer is called as the andom Access Memory (AM). This AM is place where CPU temporarily stores information, which it needs to perform a function. The quantum of memory is directly related to the extent of complicated functions it is able to perform. It is important to get a system having at least 256 MBs AM or 512 MBs or higher is preferred. For the greater part, the more memory to which the system can be upgraded to in future is better. The latest software programs are always extremely resources hungry.

Input-devices: - Input devices are employed to enter information and direct the commands to your computer. The two most typical input devices are a keyboard…...

mla

References

Improve Your Computer's Performance. Retrieved at on 27 November, 2004http://h50055.www5.hp.com/smb/ph/resources/improve.aspxAccessed

Purchasing a Computer Investing in Your Career. Union Technologist. No: 52 January 2001. Retrieved at   on 28 November 2004http://www.chtu.org/Tech/Tech52.html#waitAccessed 

Purchasing a Computer System. The Computer Specialist. Retrieved at   Accessed on 28 November 2004http://www.coroneldp.com/Prchtips.htm .

Upgrading Your Computer Components. March, 2003. Retrieved at   on 27 November, 2004http://www.techsoup.org/howto/articlepage.cfm?ArticleId=142&topicid=1Accessed 

Essay
Computer Is a Device That Accepts Information
Pages: 1 Words: 333

computer is a device that accepts information in the form of digitalized data and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed. Used the right way, computers can be an enormous personal and business productivity tool for automating numerous routine tasks and increasing information storage, retrieval and exchange. Unfortunately, computers also facilitate and expand crime.
Computer crime pertains to any intentional or unintentional harm done to or with information and/or hardware that may result in losses of, or injury to, property, services, and people. Many crimes involving computers are no different from crimes without computers. Some examples include:

Using a computer and peripherals for forgery or counterfeiting is the same crime as using an old-fashioned printing press with ink.

Stealing a laptop computer with proprietary information is the same crime as stealing a briefcase that contains papers with proprietary…...

mla

Bibliography

Eder, Karen. Defining Computer Crime and Technology Misuse." Technology Studies in Education Research Portal. 23 Nov. 2003. http://lrs.ed.uiuc.edu/wp/crime/definition.htm.

Standler, Ronald B. "Computer Crime." 2002.

23 Nov. 2003.  http://www.rbs2.com/ccrime.htm .

TechTarget. 23 Nov. 2003.  http://searchwin2000.techtarget.com/sDefinition/0,sid1_gci211829,00.html .

Essay
Computer Revolution the Effects of
Pages: 3 Words: 1054

It is safe to say that the computer revolution has so dramatically changed the manner in which academics and novices work. "...the uses of information technology are diverse; as data have to be processed, and as word data are laborious to process, and as several powerful packages for data analysis and processing exist, researchers will find it useful to make full use of computing facilities.
Cohen, Manion, and Morrison 155)

The results of the computer revolution, in their entirety have yet to be fully realized but the manner in which it has changed and continues to change research is fundamental to the way it will continue to change education. Seekers of truth may find it difficult to weed through the massive amounts of information but organizing large volumes of knowledge into relatively small spaces reiterates the vastness of the world and with the right skills and training can revolutionize thought.

A according…...

mla

Works Cited

Anderson, Ray C. "The Next Industrial Revolution." Forum for Applied Research and Public Policy 15.4 (2000): 23.

Cohen, Louis, Lawrence Manion, and Keith Morrison. Research Methods in Education. London: Routledge Falmer, 2000.

Halal, William E., and Jay Liebowitz. "Telelearning: The Multimedia Revolution in Education." The Futurist Nov.-Dec. 1994: 21.

Papert, Seymour. The Children's Machine: Rethinking School in the Age of the Computer. New York: Basic Books, 1993.

Essay
Internet in Response to the
Pages: 11 Words: 3019

This lead was accomplished through a partnership nearly a half-century old among government, industry and academia. I member of that partnership was the National Science Foundation (NSF). As Strawn noted, early on, scientists and engineers at American universities began to join the young APANet, as they worked on basic research funded primarily by the NSF. Acknowledging this, the NSF began supporting national supercomputing centers, in the mid-1980s, as a means of giving American scientists, engineers, and students greater access to high-performance computing that was state of the art, and developed Computer Science Network (CSNET).
Creation of these national supercomputer centers by NSF was critical to the development of the Internet. To further enhance U.S. scientists' access to these centers, NSF established the NSFNET national backbone network that connected the NSF supercomputing centers to U.S. universities. NSF also promoted the creation of regional networks to connect colleges and universities to the…...

mla

References

Bellis, M. Inventors of the Modern Computer. 2007. About.com. November 7, 2007  http://inventors.about.com/library/weekly/aa091598.htm .

Brief History of the Internet. 10 Dec 2003. Internet Society. November 7, 2007  http://www.isoc.org/internet/history/brief.shtml .

Cold War. 2003. National Park Service. November 7, 2007  http://www.nps.gov/archive/elro/glossary/cold-war.htm .

DARPA Over the Years. 27 Oct 2003. DARPA. November 7, 2007  http://www.darpa.mil/body/overtheyears.html .

Q/A
How has the evolution of computers shaped modern society?
Words: 339

1. The rapid evolution of computers has revolutionized the way we live, work, and interact with one another.

2. From the invention of the first computer to the development of artificial intelligence, technology has reshaped modern society in profound ways.

3. As computers continue to advance, we are faced with new ethical dilemmas and questions about privacy, security, and the role of technology in our lives.

4. The impact of computers on modern society can be seen in everything from education and healthcare to business and entertainment.

5. Computers have not only changed how we communicate and access information, but....

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now