Free Essay

Computer

In: Computers and Technology

Submitted By xpinca682
Words 3633
Pages 15
Journal of Leadership, Accountability and Ethics

Computer Addiction and Cyber Crime
Nick Nykodym The University of Toledo Sonny Ariss The University of Toledo Katarina Kurtz The University of Toledo

This research explores the relationship between computer addiction and cyber crime. There is evidence of computer addiction in medical settings, scholarly journals and legal proceedings. Reviewing the history of computer addiction has shown that computer addiction can be related to cyber crime. This paper will define computer addiction, show how various cyber crimes, especially those against businesses and organizations, can be motivated by computer addiction and propose further research on how managers can deal with cyber crime in a business, by recognizing addictive behaviors and computer addiction in their employees. HISTORY OF COMPUTER ADDICTION Computer addiction is an idea that has been in existence for years. Since the 1970s, avid computer programmers and hackers have been called “addicts” by both psychologists and the general public (Reed, 2002, p. 135). In 1976, Weizenbaum wrote about computer programmers who could sit and work at their computer terminals for twenty or thirty hours at a time. This behavior however, was viewed at the time as useful to technology and society. Computers, once seen as huge government machines that only very knowledgeable people could use, transformed into user-friendly tools that could be used by the everyday person. It became more common to see computers in homes and businesses during the 1980s. This change meant more people were using computers, and more people were becoming addicted to computer use. The idea of computer addiction became more pervasive in the 80’s, and because of the social atmosphere of the time, there was widespread use of drug and addiction metaphors describing obsessive use of computers (Reed, 2002, p. 137). In fact, the PC is sometimes referred to as the “LSD of the 1980s” (Elmer-DeWitt, 1993, p. 63).

The Shotton studies on computer dependency in 1989 did nothing to discourage the idea of computer addiction. Shotton (1989) wrote that “in all instances where personal contact was made with people who worked with computers and computer users, there was belief in the occurrence of this syndrome (computer dependency)” (p. 20). Shotton mentions that many people felt that this dependency could also lead to negative consequences, such as academic and professional problems and decreased social interactions (Shotton, 1989, p. 20). Shotton’s analysis of computer dependent individuals found that they tend to be younger, unmarried men. Many were also first born children who had occupations within areas of science and technology (Shotton, 1989, p. 37). The result of these studies showed that computer dependency was a plausible syndrome and even began to show that profiling could be performed to show what kind of social and demographic influences nurture computer dependency. During the 1990s, computer hacking became more widespread and resulted in the notion of hackers as “computer addicts.” In US courts, convicted hackers labeled as “addicts” saw increased rehabilitative therapy, computer use supervision and jail time. Computer hacker Kevin Mitnick’s history within the court system, shows how harsh punishments for computer crimes became during this time. In 1989, Mitnick was arrested for computer fraud and sentenced to one year in prison plus six months in an addiction rehabilitation program. At the time, this was the harshest sentence ever handed out by a court for this offence. Mitnick was released in 1990, only to be arrested again in 1995 for violating his probation by using computers. Mitnick was seen as an electronic terrorist and a dangerous individual, and he thus became the symbol of computer obsession gone wrong. For these reasons, it is not strange for Mitnick’s defense to be addiction and for his sentence to be so harsh. The Mitnick case introduced and legitimized the notion of clinical computer addiction to the US legal system (Reed, 2002, pp. 138-142). The term Internet Addiction Disorder (IAD) was first coined by Dr. Ivan Goldberg in the late 1990s. The term was used to describe pathological obsessive computer use. Dr. Goldberg also used the terms webaholic and pathological computer use disorder. IAD is not currently listed as an addiction by the American Psychiatric Association (APA), but it is described under the category of Impulse Control Disorder (ICD) in the American Psychiatric Association (APA) Diagnostic and Statistical Manual, IV (Wieland, 2005, p. 154). Other terms such as Pathological Internet Use (PIU) and Pathological Computer Use (PCU) are also used to describe computer addiction. These terms are used interchangeably with each other and with IAD. Though some experts argue that these syndromes are not truly mental diseases, proponents of computer addiction, notably those who run or work in clinics where patients are treated for these afflictions, claim that they are real diseases. Diagnosing Computer Addiction There were an estimated 2.3 to 5.6 million addicted computer users in 1997 (Young, 1998, p. 27). In 2005, the estimate of addicted computer users increased from 11.3 to 18.9 (Kershaw, 2005). Fifteen signs of addiction, according to Internet/Computer Addiction Services in Redmond, Washington, are as follows: 1. Inability to predict the amount of time spent on the computer. 2. Failed attempts to control personal use for an extended period of time. 3. Having a sense of euphoria while on the computer. 4. Craving more computer time. 5. Neglecting family and friends. 6. Feeling restless, irritable and discontent when not on the computer.

7. Lying to employers and family about computer activity. 8. Problems with school or job performance, as a result of time spent on the computer. 9. Feeling of guilt, shame, anxiety or depression as a result of time spent on the computer. 10. Changes in sleep patterns. 11. Health problems such as carpal tunnel syndrome, eye strain, weight changes, backaches and chronic sleep deprivation. 12. Denying, rationalizing, and minimizing adverse consequences stemming from computer use. 13. Withdrawal from real-life hobbies and social interactions. 14. Obsessing about sexual acting out through the use of the Internet. 15. Creation of enhanced personae to find cyberlove or cybersex. In addition to these symptoms, many experts also said that they see similar signs of withdrawal in computer addicts as in drug or alcohol addicts, symptoms such as profuse sweating, severe anxiety and paranoia (Kershaw, 2005). Furthermore, some patients are predisposed to becoming addicted to computers. Histories of psychological diseases or other types of addiction, such as gambling or drugs, make patients more susceptible to computer addiction (Wieland, 2005, p. 154). Computer addiction can also cause considerable development problems, including attention deficit disorder and other social issues, in young adults (Kershaw, 2005). Computer addiction is a behavior-oriented addiction. “In behavior-oriented addiction, those who get hooked, are addicted to what they do and the feelings they experience when they are doing it” (Young, 1998, p. 17). Computers become a vehicle to compensate for other things lacking in a person’s life such as relationships, solid marriages, strong and fulfilling careers or financial security. Computer addiction essentially becomes a catchall characterizing five main computer-related issues: cybersexual addiction, cyber relationship addiction, net compulsions (addiction to online gambling, stock trading, shopping, etc.), information overload (web surfing and database searching), and addiction to interactive computer games (Young, Pistner, O’Mara & Buchanan, 1999, p. 477, Wieland, 2005 p. 154). The reasons men and women become addicted to the Internet are different. Men want to fulfill information glut, play explicit or aggressive games, and engage in cybersex. They seek control, power, influence and dominance. On the other hand, women look to the Internet as a source of friendship, romance and support (Wieland, 2005, p. 154). The types of experiences men gain from the Internet are more likely to become destructive, than the experiences women seek. Denial is strong among sufferers of computer addiction. In 1998, Young noted the “one more minute syndrome.” The name comes from the typical response given by computer addicts who are asked to get off the computer. These addicts become irritable when asked to get off because they lose their concentration and also the sense of euphoria they gain from their time online. Young noted that this rationalization of “one more minute,” is very similar to an alcoholic who claims he or she will stop drinking after one drink. Computer addicts can also create problems in a workplace environment. Employees who spend a lot of time on the computer can become easily irritable, causing increased arguments with coworkers and unfriendly work relationships. Increased time on the computer also results in decreased work activity and production (Beard, 2002, p. 6).

There is a growing number of treatment options for addicted computer users including behavioral therapy and inpatient rehabilitation centers. They use similar approaches in treating computer addiction as for other types of addiction, such as 12-step programs. Unfortunately, since IAD is not a currently recognized syndrome by the APA, insurance companies do not reimburse patients for these types of services. Patients either pay expenses out of pocket or therapists and treatment centers will bill for other problems, including impulse control disorders (Kershaw, 2005). Unlike treatment for other addictions (drug, alcohol, etc.) which call for total abstinence, treatment for computer addiction is all about moderate, manageable use. The goal for computer addicts is to be able to use computers without becoming or remaining dependent on it as an escape from reality (Kershaw, 2005). CRIME ADDICTION An increasing number of people are also starting to view crime as an addiction. There has been an upsurge in organizations modeled after Alcoholics Anonymous, which deal with criminal addiction. One group is Crime Addiction Anonymous out of Vancouver, Canada. It is “dedicated to the contentious premise that crime can be an illness as tenacious as dependency on alcohol or drugs” (MacQueen, 2004, p. 82). One of its members mentions his reasons for committing crimes as the power trip he receives and the fact that committing crimes is thrilling and fun. Though some experts are reluctant to label this activity as “addiction,” many concede that crime can be caused by psychological needs. Psychologists have labeled criminals as “compulsive” or as being attracted by “the rush” (MacQueen, 2004, p. 83). Criminal motivation can also be based on psychological desires. Criminals may be seeking power, reassurance, trying to assert their power or seeking retaliation for past harms. In these cases, criminals are hoping to fulfill a psychological motive or need (Turvey, 2002, p. 310). Opportunistic crime also exists. Evidence shows that some people commit crimes simply because they had the opportunity laid in front of them and took it (Turvey, 2002, p. 206). This shows a lack of restraint by these individuals, which can lead to further criminal activity. Clinical psychologists have even tried to classify motives for crime in order to develop effective treatment for criminals to overcome their behaviors and prevent future criminal activity (Turvey, 2002, p. 307). Though there is no clinical term for crime addiction, psychologists still seem to be aware of the psychological element of crime and have a desire to treat criminals in order to cure them of their aspiration to commit crimes. Computers and the Internet: Tools for Criminals In recent times, computers and the Internet have become very useful tools for criminals. All types of criminals, from hackers and spies to sexual predators and murderers, are able to use computers and the Internet to facilitate and ease the processes of their crimes. The Internet in particular is attractive to criminals for many reasons. 1) The Internet extends the reach of the criminal. Before the advent of the Internet, criminals were limited to committing crimes against people or businesses in their geographic locale. The Internet however, makes it possible for criminals to extend their reach all over the world. 2) The Internet helps criminals to more easily investigate potential victims. Criminals can alter their personality to obtain information directly from the potential victim, use the Internet to search for information on their potential victim, or

even hack into the victim’s computer through the use of Trojan Horses or other spyware or viruses. 3) Criminals on the Internet feel safer committing their criminal acts because of their ability to conceal or alter their identities. This false sense of security can be their downfall, but at the same time it can be their vehicle to fuel fantasies, to fulfill information glut desires, or to feed a need for power (Turvey, 2002, pp. 549-550). Internet criminals are motivated by a number of desires. Some are attracted to their crimes by the intellectual challenge, others are seeking power or attention and others, especially hackers, are motivated by a need to bolster their self-esteem. These motivations are rooted in psychological needs and can signify an obsessive or addictive personality (Turvey, 2002, pp. 552 & 555). Computers and the Internet: Reason for Crime There is a general consensus among psychologists that past addictions, such as substance abuse or addiction to gambling, can lead to future addictive behaviors. Many computer addicts have a history of addiction. Addictive behavior breeds addiction. For these reasons, it is safe to say that computers are not only vehicles to commit crime, but computer addiction can become the reason for crime in general. It is easy to see how computer addiction can lead to different types of crime, especially opportunistic crime. Individuals who spend a significant amount of time on their computers or the Internet, computer addicts, have many opportunities to commit crimes. These people may have never known that these criminal prospects existed before, but, by spending increased amounts of time on the Internet, have come to see a whole variety of opportunities laid out in front of them. As it was previously mentioned, computer addiction can also lead to serious crimes against businesses. Computer addiction can cause increased irritability in employees and tension amongst coworkers. This can lead to increased employee turnover and training and human resources costs. Computer addiction also causes decreased productivity among workers, which can lead to significant reductions in profits for a company. Computer addiction can also lead to information glut. A person can become so engrossed in finding out information and searching Internet databases, that he or she will start to overstep boundaries. This information craving can lead to hacking into company databases and even espionage. These criminals can be motivated by their addictions and by other psychological demands. Computer addiction can lead to a false perception of reality. People feel that the Internet offers an escape from real life and allows them to remain invisible behind a barrier of anonymity. These feelings also give a computer addict a false sense of security, since he or she feels that there are no rules, and therefore no punishment, on the Internet. This fictitious existence makes it easy for individuals to feel no remorse for their crimes, and to believe there will be no reprimand for committing them. Addiction and Profiling a Cyber Criminal There has been some research about how to profile cyber criminals. In 2005, Nykodym, Taylor and Vilela broke insider cyber crime down into four specific types and showed how the differences in the motives for the crimes, influence the kind of person who is willing and able to commit them. These categories of crime are espionage, sabotage, theft and personal abuse of an

organizational network. These categories and the profiling of the criminals will be explored in the following paragraphs. The first type of crime, espionage, is generally committed by a spy planted in a company by one of its competitors. Since these spies are after top secret information, they are generally placed high in the hierarchy of the company so that they have more access to company records. Since managers are generally older individuals, spies will generally be at least thirty years and will be older if they assume positions of top management. Spies also want to blend in as much as possible in a company. For this reason, spies placed into organizations will reflect the race and culture structure of the particular company and will be very calm and reserved individuals. Spies also have a thorough understanding of computers and the IT area in a company in order to commit crimes and hide the evidence (Nykodym et al., 2005, p. 413). Sabotage on the other hand, is generally caused by an individual for personal reasons. Saboteurs are similar to spies when it comes to knowledge of computers or IT, and are people who also have access to the company’s network. Their motives however, are usually caused by a desire to get revenge on the company for a personal misfortune such as a missed promotion. These crimes can be committed while the criminal is still employed within the company or even after the criminal leaves or is fired by the company, as long as the criminal is still able to access or hack into the company network. Saboteurs are generally between the ages of twenty-five and forty, but have also been with the company long enough to have a complete knowledge of the company’s network, especially its weaknesses (Nykodym et al., 2005, p. 413). Thieves are also motivated by personal gain, but it is purely financial in nature. Thieves want to access valuable information from a company and use it for financial gain later. In 2005, Nykodym et al. showed that cyber crimes against a company valuing less than $100,000 were generally committed by a man or woman who is between the ages of twenty to twenty-five years old and who is still in the lower hierarchy of the company. On the other hand, crimes costing a company between $100,000 and $1,000,000 are generally committed by a man between the ages of twenty-five and thirty-five. Crimes causing over $1,000,000 of damage are caused by top management members, who are generally men over the age of thirty-five. The last type of crime, abuse of a company’s network, is the most common of the four categories. It can be caused by any individual in a company who uses the network for personal use such as reading the news, checking personal email, online gaming or gambling, etc. Though each case does not account for much loss, the sum of all loss of productivity within the company can be staggering. A person who commits this act against a company may “oppose supervisors, be non-conformant to rules and regularly break rules” (Nykodym et al., 2005, p. 414). Managers at a company can fight insider cyber crime by setting up log-on accounts for employees, installing firewalls and limiting access to information based on job titles. Managers need to be observant of employee behavior and they also need to be forthright about the company’s computer usage policies (Nykodym and Marsillac, 2007, pp. 8-9). In the future, managers may also be able to thwart cyber crime by recognizing addictive behaviors in an employee. Though no research has been done to show how addictive personalities could be a determinate of cyber crime, it is easy to consider how addiction could cause cyber crime in an organization. It has already been shown how many people with computer addiction also have other addictions (e.g. gambling addiction), and how these addictions could easily lead to abuse of the company network. Addictive personalities could also lead to an increased desire to sabotage or steal for financial gain from a company. Further research needs to be done to show the extent

of addiction as a reason for crime and to see if programs set up by companies to help employees with addictive behaviors, especially addiction to computers, could minimize instances of insider cyber crime. Conclusion Computer addiction, though not officially recognized by the APA as a disorder, nonetheless is commonly believed to be such a problem that treatment is needed to correct it. Symptoms are numerous, but one predisposing factor that can lead to computer addiction is a person with a history of other addictions. There is also growing support in favor of viewing crime as an addiction. A business setting can be a tempting atmosphere for an individual who has a problem with addictive behavior, since computer networks provide an easy vehicle through which cyber crime can be committed. Managers in businesses can fight back against cyber crime by learning to recognize addictive behavior and businesses in the future may be able to further thwart insider cyber crime by providing treatment programs for people suffering from computer addiction. REFERENCES Beard, K. (2002). Internet addiction: Current status and implication for employees. Journal of Employment Counseling, 39(1), 2-11. Elmer-DeWitt, Philip (1993, Feb 8). Cyberpunk. Time Magazine, 58-65. Kershaw, Sarah (2005, Dec. 1, late ed.). Hooked On the Web: Help is on the Way. New York Times, p. G1. MacQueen, Ken (2004, Dec. 27). Hooked on Crime. Maclean’s, 82-83. Nykodym, Nick, & Erika L. Marsillac (2007, Mar. 4). The Managers Guide to Understanding, Detecting and Twarting Computer Crime: An International Issue. Published in the proceedings of The National Business and Economic Society International meeting 2007. Nykodym, Nick, Robert Taylor, & Julia Vilela (2005). Criminal profiling and insider cyber crime. Computer Law & Security Report, 408-414. Reed, Lori (2002). Governing (through) the Internet. European Journal of Cultural Studies, 5(2), 131-153. Shotton, Margaret (1989). Computer Addiction? A Study of Computer Dependency. London: Taylor & Francis. Turvey, Brent (2002). Criminal Profiling. London: Academic Press. Weizenbaum, Joseph (1976). Computer Power and Human Reason. New York: W.H. Freeman. Wieland, Diane M. (2005). Computer Addiction: Implications for Nursing Psychotherapy Practice. Perspectives in Psychiatric Care, 41, 153-161.

Young, K. (1998). Caught in the net. New York: Wiley. Young, K., M. Pistner, J. O’Mara, & J. Buchanan (1999). Cyber disorders: The mental health concern for the new millennium. CyberPsychology and Behavior 2(5), 475-479.

Similar Documents

Free Essay

Computer

...Computer The word'computer ' is an old word that has changed its meaning several times in the last few centuries.The Techencyclopedia(2003) defines computer as " a general purpose machine that processes data according to a set of instructions that are stored internally either temorarily or permanently" Computer history The trem history means past events.It indicates the gradual development of computers.Here we will discuss how this extraordinary machine has reached of it's apex. In the begining............................... The history of computers starts out about 2000 years ago, at the birth of the 'abacus' a wooden rack holding two horizontal wires with breads strung on them.Just like our present computer,abacus also considered a digit as a singal or codeo and processed the calculation. Blasie Pascal ists usually credited to building the first digital computer in 1942.It added numbers to help his father.In 1671,Gottofried Wilhelm Von Leibniz invented a computer that was built in 1694.It could add,and, after changing somethings around,multiply. Charles Babbage: A serious of very intersting developement in computer was started in Cambridge,England,by Charles Babbage, a mathmatics proffessor.In 1982,Babbge realized that many lng calculations,espically those need to make mathematical tabes ,were really a series of predictable actions that were constantly repated.From this he suspected that it should...

Words: 995 - Pages: 4

Premium Essay

Computer

...Computer From Wikipedia, the free encyclopedia Jump to: navigation, search For other uses, see Computer (disambiguation). "Computer technology" redirects here. For the company, see Computer Technology Limited. A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem. Conventionally a computer consists of some form of memory for data storage, at least one element that carries out arithmetic and logic operations, and a sequencing and control element that can change the order of operations based on the information that is stored. Peripheral devices allow information to be entered from external source, and allow the results of operations to be sent out. A computer's processing unit executes series of instructions that make it read, manipulate and then store data. Conditional instructions change the sequence of instructions as a function of the current state of the machine or its environment. The first electronic computers were developed in the mid-20th century (1940–1945). Originally, they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers...

Words: 6579 - Pages: 27

Free Essay

Computer

...A proxy server is a computer that acts as an intermediary between the users computer and the Internet. It allows client computers to make indirect network connections to other network services. If use proxy server, client computers will first connect to the proxy server, requesting some resources like web pages, games, videos, mp3, e-books, any other resources which are available from various servers over Internet. As soon as getting such request, the proxy server will seek for the resources from the cache in its local hard disk. If the resources have been cached before, the proxy server will return them to the client computers. If not cached, it will connect to the relevant servers and request the resources on behalf of the client computers. Then it caches resources from the remote servers, and returns subsequent requests for the same content directly Functions of a proxy server * Help improve web performance by storing a copy of frequently used webpages * Help improve security by filtering out some web content and malicious software * Content filtering * Spying * To keep machines behind it anonymous (mainly for security). * To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server. * To apply access policy to network services or content, e.g. to block undesired sites. * To log / audit usage, i.e. to provide company employee Internet usage reporting. * To bypass security/ parental...

Words: 691 - Pages: 3

Premium Essay

Computer

...ages before, when there were no computers or any other technologies. So much we have advanced that now every information is just a click away and is in your hands 24/7. All this advancement was possible only with the introduction of a small device called the “Computer”. Computers Image Curtsey: csntrust.org.nz/attachments/Image/PC-picture-1.jpg?1367216528141 Basically, computer is a device that accepts the message by the imputer and processes this message and stores the information at the storage devices and later gives an output of the message through the output devices. A simple explanation of the computer. Normally, a computer consists of a processing unit called the Central Processing Unit or the CPU and a form of memory. In the years between 1940 and 1945 were the first electronic digital computers developed. The initial sizes were as big as a room and consumed power as much as today’s personal computers. Initially, computer was related to a person who carries out calculations or computations and as such the word computer was evolved in 1613 and continued till the end of 19th century. Later it as re-described as a machine that carries computations. The early computers were limited in their functions. It was the fusion of automatic calculation and programmability that produced the first computers that were recognized in 1837. Charles Babbage in 1837 was the first to introduce and design a fully programmed mechanical computer, his analytical engine. Due to limited...

Words: 999 - Pages: 4

Free Essay

Computer

...Assembly Language Programming Lecture Notes Delivered by Belal Hashmi Compiled by Junaid Haroon Preface Assembly language programming develops a very basic and low level understanding of the computer. In higher level languages there is a distance between the computer and the programmer. This is because higher level languages are designed to be closer and friendlier to the programmer, thereby creating distance with the machine. This distance is covered by translators called compilers and interpreters. The aim of programming in assembly language is to bypass these intermediates and talk directly with the computer. There is a general impression that assembly language programming is a difficult chore and not everyone is capable enough to understand it. The reality is in contrast, as assembly language is a very simple subject. The wrong impression is created because it is very difficult to realize that the real computer can be so simple. Assembly language programming gives a freehand exposure to the computer and lets the programmer talk with it in its language. The only translator that remains between the programmer and the computer is there to symbolize the computer’s numeric world for the ease of remembering. To cover the practical aspects of assembly language programming, IBM PC based on Intel architecture will be used as an example. However this course will not be tied to a particular architecture as it is often done. In our view such an approach...

Words: 85913 - Pages: 344

Premium Essay

Computer

...new releases and upgrades are made available from time to time. The database administrator will be aware of any new versions or upgrades to existing versions that could improve the efficiency of a currently installed database. In some circumstances database administrators are authorized to upload free upgrades and install them. In the event that a new version is available, the administrator will check with others in the company to determine if the cost of replacing the existing database software is worth the investment. Earnings for this job as of 2012 median of $77,080 per year and about $37.06 per hour, but the earnings can reach up to about $118,720; in the top 10 percent. Entry level education for this job is a bachelor’s degree in computer science, information science, or management information systems. The Bureau of Labor Statistics projects 15.1 percent growth of employment for database administrators;...

Words: 318 - Pages: 2

Premium Essay

Computer

...ile Format: PDF/Adobe Acrobat - Quick View by G Vink - 1998 - Cited by 1 - Related articles software-hardware interface debugging in an embedded environment. ... materials and processes used in manufacturing semiconductors, through to electronic design tools, packaging .... Next to this, for him, peripheral simulation is ... www.tasking.com/resources/debugtechn-trends.pdf ► The Technology Of Hims: Hardware, Software, Peripheral And ... Nov 9, 2010 ... The Technology of HIMS: Hardware, Software, Peripheral and Processes. Healthcare Information Management Systems (abbreviated as HIMS) are ... www.termpaperwarehouse.com/...Technology-Of-Hims-Hardware-Software/ 25880 - Cached About: Macs - Macintosh Hardware & Software Reviews, Tips, Guides ... Jan 9, 2011 ... Get the inside scoop on Macintosh hardware and software, plus tips ... Take a look at the process my wife and I experienced when we took the ... macs.about.com/ - Cached - Similar Motion Computing - Tablet PCs and Peripherals - Alliance Partners ... Sharing databases and processes, they'll help you improve communication and ... B Sharp Technologies is a software and services company providing web-based healthcare ... medical record) and HIM (health information management) software to .... in software licenses, software upgrades, hardware, and IT support. ... www.motioncomputing.com/partner/alliance.asp - Cached - Similar Critical Success Factors in Establishing the Electronic Health ... The electronic health record...

Words: 426 - Pages: 2

Premium Essay

Computer

...What is Computer : Computer is an electronic device that is designed to work with Information.The term computer is derived from the Latin term ‘computare’, this means to calculate.Computer can not do anything without a Program.it represents the decimal numbers through a string of binary digits. The Word 'Computer'usually refers to the Center Processor Unit plus Internal memory. Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions (called program) and gives the result (output) and saves output for the future use. It can process both numerical and non-numerical (arithmetic and logical) calculations.The basic components of a modern digital computer are: Input Device,Output Device,Central Processor. A Typical modern computer uses LSI Chips. Charles Babbage is called the "Grand Father" of the computer.The First mechanical computer designed by charles Babbage was called Analytical Engine. It uses read-only memory in the form of punch cards. Four Functions about computer are: accepts data | Input | processes data | Processing | produces output | Output | stores results | Storage | Input (Data): Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc. Process: Process is the operation of data as per given instruction. It is totally internal process of the computer system. Output: Output...

Words: 1953 - Pages: 8

Premium Essay

Computers

...The History of Computers From primitive abaci to lab tops and calculators, the computer has evolved through time to become the essential part of our technocratic society. The development of the computer has shaped the way technology and science is viewed in different cultures around the world. The connotation of what a computer is nowadays brings to mind a monitor, keyboard, processor and its other electronic components; however, that is not how things have always been. From the Chinese using abaci to count, to the Druids' usage of stones to follow the seasonal changes, to the Europeans using Pascalines and calculators to work out mathematical problems the concept of the computer has been around for hundreds of years (Hoyle). Therefore, the history of computers is important to observe not only for the influence it brought to our culture, but the progress it has made through time. The history of modern computers has been influenced by the earlier advancement of primordial technology. The abacus developed in circa 500 B.C for example, used pebbles, rocks, beads, or shells to keep track of the counters numbers. Furthermore, "the abacus was man's first attempt at automating the counting process" (Hoyle). In addition, the Pascaline, invented and built by a French philosopher and mathematician Blaise Pascal, was the first mathematical adding machine (Long 54). The Pascaline was a gear-driven machine that allowed the user to calculate answers without doing arithmetic (Hoyle). In...

Words: 803 - Pages: 4

Premium Essay

Computer

...Computer A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format. A computer can process data, pictures, sound and graphics. They can solve highly complicated problems quickly and accurately. Block Diagram Input Unit: Computers need to receive data and instruction in order to solve any problem. Therefore we need to input the data and instructions into the computers. The input unit consists of one or more input devices. Keyboard is the one of the most commonly used input device. Other commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. All the input devices perform the following functions.  Accept the data and instructions from the outside world.  Convert it to a form that the computer can understand.  Supply the converted data to the computer system for further processing. Storage Unit: The storage unit of the computer holds data and instructions that are entered through the input unit, before they are processed. It preserves the intermediate and final results before these are sent to the output devices. It also saves the data for the later use. Memory Size: All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is represented by an 8 bit code. The set of 8 bits is called a byte. A character occupies 1 byte space. A numeric occupies 2 byte space. Byte is the space occupied in the memory. The size of the primary storage...

Words: 9444 - Pages: 38

Premium Essay

Computer

...COMPUTER HARDWARE AND COMPONENTS COMPUTER HARDWARE AND COMPONENTS Computer Basics     Equipment (Hardware) COMPUTER | A machine that processes information and performs computations. | Tower or Desktop | The "box" or case that holds the parts that make up a computer:  CPU, hard disk drive, floppy drive, memory chips, power supply, interface cards, etc. Click here to learn more. | |      CPU | Central Processing Unit, or "brains" of the computer | Monitor | An output display device (looks similar to a TV) in a computer system.  You see information on the monitor's screen. | |      Screen | The viewing area on a monitor or the information or image displayed. | | | | Disk Drive | A device that reads data from (input) or records data onto a disk for storage (output). |     Floppy  | Floppy Drive | . 3-1/2" Floppy Disk |     Hard Drive | The main device that a computer uses to store information. Most computers come with a hard drive, called drive C, located inside the computer case. |     CD-ROM | ROM means Read-Only-Memory - you can only "read" information, not save. A CD can store a large amount of data including documents,  photographs, software, and music (about 20 songs) | | CD Drive | Compact Disk | | CD-R A CD-Recordable drive can put data onto a disk in just one session, and then is "closed" - one "burn" only - you can't add to it after you create it.  | CD-RW A CD-ReWritable drive can be written onto more than once - similar...

Words: 2913 - Pages: 12

Premium Essay

Computer

...(introduction) What is a Computer? B. History of computers C. (thesis) Types of computer 4.1 Supercomputer 4.2 Mainframe 4.3 Workstation 4.4 The Personal Computer or PC 4.5 Microcontroller 4.6 Server D. Hardware & software 5.7 hardware 5.8 software 5.9 firmware E. Basic operations 6.10 input 6.11 output 6.12 processing 6.13 storage F. Names for different sizes of data 7.14 Bit 7.15 Byte 7.16 kB 7.17 MB 7.18 GB 7.19 TB 7.20 PB G. Measurement of data speed 8.21 Mbps 8.22 Gbps H. Purpose of computer 9.23 performing calculations 9.24 storing data 9.25 retrieving data 9.26 processing data INTRODUCTION: WHAT COMPUTER IS? I. What is computer? A computer is a "box" that you put some "stuff" in, the box does "stuff" with it, and then the box has some way of showing the world what it's done. The stuff you put into a computer is called data, and gets into the computer using the input. Data is simply a form of information. You can put data into a computer by your keyboard, a mouse, a trackpad, a camera, an infrared sensor; anything that will give the computer more information about the world around it. Based on what information the computer has gotten, it can decide to do stuff with it. What the computer does with information is known as processing. A computer will process information...

Words: 2841 - Pages: 12

Premium Essay

Computer

...types of computers, the computers are classified according to their functions and capabilities, as: Sample essay analysis ... Types of Computers - College Essay - Scodger - StudyMode.com www.studymode.com › ... › Computers & Internet › Computer Hardware‎ Types of computers. Firstly, what is a computer? Well, a modern computer is typically an electronic or digital device that manipulates data. Computers can ... Types of Computers - Term Papers - Maliktaimurarif www.termpaperwarehouse.com › Computers and Technology‎ May 9, 2012 - Read this essay on Types of Computers . Come browse our large digital warehouse of free sample essays. Get the knowledge you need in ... History of Computers Essay - Custom Writing Service www.customwritings.com/blog/...essays/history-computers-essay.html‎ You can order a custom essay, term paper, research paper, thesis or dissertation on History of Computers topics at our professional custom essay writing service ... Computer Technology Essay - Custom Writing Service www.customwritings.com/blog/...essays/computer-technology-essay.html‎ Free sample essay on Computer Technology: Since the beginning of time ... Computers play a significant role in the school system as well. ... Categories. Essay of computer and its uses - WikiAnswers wiki.answers.com › ... › Categories › Technology › Computers‎ ... Categories > Technology > Computers > Essay of computer and its uses? ... computer is a...

Words: 470 - Pages: 2

Premium Essay

Computers

...Computers Today’s generation could never ever imagine in their wildest dreams about the world, ages before, when there were no computers or any other technologies. So much we have advanced that now every information is just a click away and is in your hands 24/7. All this advancement was possible only with the introduction of a small device called the “Computer”. Basically, computer is a device that accepts the message by the imputer and processes this message and stores the information at the storage devices and later gives an output of the message through the output devices. A simple explanation of the computer. Normally, a computer consists of a processing unit called the Central Processing Unit or the CPU and a form of memory. In the years between 1940 and 1945 were the first electronic digital computers developed. The initial sizes were as big as a room and consumed power as much as today’s personal computers. Initially, computer was related to a person who carries out calculations or computations and as such the word computer was evolved in 1613 and continued till the end of 19thcentury. Later it as re-described as a machine that carries computations. The early computers were limited in their functions. It was the fusion of automatic calculation and programmability that produced the first computers that were recognized in 1837. Charles Babbage in 1837 was the first to introduce and design a fully programmed mechanical computer, his analytical engine. Due to limited finances...

Words: 986 - Pages: 4

Premium Essay

It on Computers

...The computer is the most wonderful gift of science to the modern man. The computer can do all the works of man. Thus, after the invention of computer, the gap between man and machine has been bridged up. The dictionary meaning of the word "Computer" is an electronic calculating machine. It is derived from the word compute which means to reckon. But the function of the computer has expanded beyond the act of reckoning. Though a machine, it contains and provides innumerable information's and artificial intelligence of a very high order. It may seem strange, but it is true that the memory and intelligence of a computer can surpass those of a living human being. The mechanism of the computer is very simple. Information processing is the essence of computing. It is a data based machine. The data is fed into the machine. The machine is manipulated and then the due information is retrieved. Computer was invented due to the pressures of World War-II which witnessed the use of such sophisticated weapons as night bombers, submarines, and long range guns on ships and tanks, etc. The defenders have to fight back by shooting at targets and those targets of the enemy can be located by radar. Radar can inform not only about the location of the enemy but also about the direction and the speed of the enemy weapons. Detailed mathematical calculations are necessary to find out these things accurately. Firing tables are required by the front line soldiers. Thus the necessity of calculations...

Words: 584 - Pages: 3