Free Essay

Computers in Research

In: Philosophy and Psychology

Submitted By expThales
Words 459
Pages 2
The Computer in Research
• Computers can be very valuable in conducting a literature research
This is because of a computer device such a modem can access information stored remotely on databases; that is we can search databases containing information of psychological abstracts to obtain references relevant to our work.
• Controlling aspects of an experiment can easily and efficiently carried out by programming instructions to your computer.
Example: In can control specific intervals of a stimuli by means of slides; while advancing the slide projector it can also simultaneously control other functions in the laboratory such randomizing conditions in blocks or trials so that the stimuli can be presented in certain predetermined orders without the programmer changing the conditions manually.
• Helpful if there are repetitive operations to be performed that the opportunity for human error is great.
Example: It can repetitively record the time when a response is made and store it in a floppy disk or hard drive.
Uses of Computers in Psychology
• Computer networks for data gathering and analysis
- The sharing of information among micro computers with mainframe networks over long distances.
• Computer analysis on physiological events
- Includes cardiac activity and electro oculographic changes
• Computer as a research tool
- Computer administered surveys; an automated laboratory
• Computer Generated Speech and perception and production of synthetic speech
• Human and computer interaction
- Aids for writing, learning to program and so on.
• Computer and operant conditioning systems
- Amplitude measures of operant conditioning.
• Clinical assessment of biofeedback data
- includes eeg and ekg
• Supercomputing in psychology
- Cognitive modelling and artificial intelligence

• Teaching applications of microcomputers
- Instructional programs in psychology.
• Networking Systems

Computer Stimulation
- This is where student does not collect real data but fictitious values have been packaged into a program as if the data collection were original.
Pitfalls and Limitations
1. Computer paralysis of the laboratory.
- Computer paralysis – technologically induced disease that occurs when the researchers have not been inoculated against some of the inevitable problems that attend the transition to a computerized laboratory.
2. The Shotgun Disaster
- Involves a massive body of data which the researcher plunge into statistical analysis without having sufficiently thought about the variables and their implications that leads to mentally overwhelming or mind-boggling data.
- Ex. One student is asked for the partial correlation from an 18x18 data matrix, couldn’t even carry the print out that resulted, and much less comprehend it.
3. Don’t lose track of your raw data.
- The most serious problem that arises when computers provides us much information that you don’t want and may overload you.
- May happen when you miss apply your package program.
- Example: You may have a random model whereas the programmer selected the error term for a fixed model.
4. The Law of Hammer Revisited
- Etzioni (1975) pointed out that

Similar Documents

Free Essay

Computer Research

...Research one federal computer-related act that was created to deal with online and computer crime. •Define the problem that faced the legislators and why they created the specific act. •Summary the act and how the act addresses the specific problem(s). •Analyze the act and give feedback if you believe the act is and will be effective for protecting consumers and citizens. Is it useful to law enforcement? I did some research and found the Counterfeit Access Device and Computer Fraud and Abuse Act. The act was passed by Congress in 1984 and was the first federal computer crime legislation. The act was set in place to protect certain classified government information. Using a computer to cause damage to a computer systems hardware and software was considered to be a criminal offense. With this act in place, computer crimes continued to increase dramatically. Congress enacted the National Information Infrastructure Act of 1996. The act was title two of the Economic Espionage Act of 1996. The provisions of the original Computer Fraud and Abuse Act were strengthened and clarified because of the Act. Some lawmakers and commentators thought new legislation would be necessary for any new developments in technology being used to commit computer crimes. Congress also created the National Computer Crime Squad. It was created inside the FBI. The National Computer Crime Squad investigated over two hundred individual computer crime cases. Law......

Words: 459 - Pages: 2

Free Essay

Green Computer Research

...responsible use of computers and related resources and covers many potential areas of use. This research project was conducted by We Are Big Pharma, Inc. to learn more about green computing technologies and large corporate initiatives. Several green computing areas were researched and our findings are described below: Data center and overall energy efficiency Data centers are huge consumers of energy due to the electrical demands of the hardware components and the cooling systems that are required to maintain the optimal environment for the hardware. Largely because of the high cost of the energy required (estimated at $0.71 per hardware dollar by 2011), many companies are looking for ways to be more energy efficient. IBM expanded a data center in Boulder, Colorado and made the facility 45% more energy efficient than their typical data center. They used their own high-density computing systems with server and storage virtualization in conjunction with energy-efficient power and cooling systems (Brodkin, 2007). Disposal of electronic waste and recycling Electronic waste is a major concern to communities and countries around the world due to the volume of generated waste and the toxic components that may contaminate the ground, water, and impact workers in the waste facilities. Dell is a leader in the electronics recycling and responsible disposal. They have teamed with Goodwill Industries International, Inc. to responsible recycle any brand of unwanted computers or......

Words: 1367 - Pages: 6

Premium Essay

Research Paper in Computer

...UNIVERSIDAD DE ZAMBOANGA School of Education, Arts and Sciences Zamboanga City SYLLABUS in NSTP (CWTS) Course Title: NSTP 1 (CWTS) Course Credit: 3 units Descriptive Title: National Service Training Program (Civic Welfare Training Service) Semester: First Semester, SY: 2014-2015 Curricular Year: First Year Degree: All 2-year courses and 4-year degrees Course Description: The Civic Welfare Training Service (CWTS) 1 as a component of the National Service Training Program (NSTP) is a course for the first year student both male and female designed to help them understand, appreciate and eventually live the basic concepts of Students Transformation and Enrichment for Truth (STET) with the end in view of empowering them of becoming an important resources in the nation building. Civic Welfare Training Service (CWTS) 1 is designed to encourage the youth to contribute to the improvement of the general welfare and the quality of life of the Filipino. CWTS requires students to carry out projects and activities in their assigned barangays or Government Organization (GO’s) and Non Government Organization (NGO). Particularly activities contributory to the general welfare and the betterment of life for the members of the community or the enhancement of its facilities especially those devoted to improving health, education, environment, safety, livelihood, entrepreneurships and morals of citizenry and other social welfare services. Course......

Words: 1204 - Pages: 5

Premium Essay

Wireless Computer Research

...Meraki White Paper: Wire ess LAN Security Version 1.0, March 2009 Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security requirements for most companies and how Meraki can help them meet those challenges easily and at a low cost. Copyright © 2009 Meraki, Inc. All rights reserved. Trademarks Meraki® is a registered trademark of Meraki, Inc. 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Table of Contents ( The Need For Sec rit" ###################################################################################################################### + ) What Doesn$t Work ######################################################################################################################### , * Recommended Sec rit" Architect res #############################################################################################- )!' Open with VPN !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! , )!( Shared Ke #WPA("PSK$ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - )!) User Authentication #WPA("Enterprise$ !!!!!!!!!!!!...

Words: 2275 - Pages: 10

Premium Essay

Research Computers and Comunications

...The Importance of Effective Communication Introduction People in organizations typically spend over 75% of their time in an interpersonal situation; thus it is no surprise to find that at the root of a large number of organizational problems is poor communications. Effective communication is an essential component of organizational success whether it is at the interpersonal, intergroup, intragroup, organizational, or external levels. In this chapter we will cover the basic process of communication and then we will cover some of the most difficult communication issues managers face-providing constructive and effective feedback and performance appraisal. The Communication Process Although all of us have been communicating with others since our infancy, the process of transmitting information from an individual (or group) to another is a very complex process with many sources of potential error. Consider the simple example: • Terry: "I won't make it to work again tomorrow; this pregnancy keeps me nausious and my doctor says I should probably be reduced to part time. • Boss: Terry, this is the third day you've missed and your appointments keep backing up; we have to cover for you and this is messing all of us up. In any communication at least some of the "meaning" lost in simple transmission of a message from the sender to the receiver. In many situations a lot of the true message is lost and the message that is heard is often far different than......

Words: 2344 - Pages: 10

Premium Essay

An Evolution of Computer Science Research

...version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus......

Words: 15250 - Pages: 61

Premium Essay

Research Methods In Computer Science

...A Report On “RESEARCH METHODS IN COMPUTER SCIENCE” Submitted by Nitish Ashok Shinde (5210) ME Comp- I 2nd shift Introduction Computer Science has proved its importance in various domains of science like natural sciences, social sciences, humanities and cultural science [1]. Computer science (CS) characterized as an empirical discipline, in which each new program can be seen as an experiment, the structure and behavior of which can be studied [2]. The term Information and Communication Technology (ICT) is analogous to Information Technology, but it stresses more on role of technologies like telecommunications, computers, software's, etc, which enable users to access, store, and manipulate information [3]. Research methods...

Words: 834 - Pages: 4

Free Essay

An Overview of Computer Viruses in a Research Environment

...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...

Words: 12539 - Pages: 51

Premium Essay

Open Problems in Computer Virus Research

...Skip to main content Open Problems in Computer Virus Research Steve R. White IBM Thomas J. Watson Research Center Yorktown Heights, NY USA Presented at Virus Bulletin Conference, Munich, Germany, October 1998 Abstract Over a decade of work on the computer virus problem has resulted in a number of useful scientific and technological achievements. The study of biological epidemiology has been extended to help us understand when and why computer viruses spread. Techniques have been developed to help us estimate the safety and effectiveness of anti-virus technology before it is deployed. Technology for dealing with known viruses has been very successful, and is being extended to deal with previously unknown viruses automatically. Yet there are still important research problems, the solution to any of which significantly improve our ability to deal with the virus problems of the near future. The goal of this paper is to encourage clever people to work on these problems. To this end, we examine several open research problems in the area of protection from computer viruses. For each problem, we review the work that has been done to date, and suggest possible approaches. There is clearly enough work, even in the near term, to keep researchers busy for quite a while. There is every reason to believe that, as software technology evolves over the next century or so, there will plenty of important and interesting new problems that must be solved in this......

Words: 6039 - Pages: 25

Premium Essay

Chapter 1 in Research About Computer Games Addiction

...EFFECTS OF INVOLVEMENT IN COMPUTER GAMES TO THE STUDY HABITS OF THE MARIAN FRESHMEN STUDENTS DURING THE FIRST SEMESTER OF SCHOOL YEAR 2012-2013 A Research Presented to Mr. Paul C. Morales Saint Mary’s University Bayombong, Nueva Viscaya In Partial Fulfilment Of the Requirements in _________________________ Submitted By: Kimberly Anne Martinez Lloyd Rico Antonio Manuel Douglas Inaldo Leigrich Salvador Herman Anthony Aseron February 2013 Chapter 1 THE PROBLEM AND ITS BACKGROUND Rationale Modernization of living has a great impact to one of us, specifically in the field of technologythat introduces us to this, computer age because of its many benefits that makes our lives better and helps us do work a lot better. One evidence is the excessive of use of computers of some Marian students, it gives us a faster access to the world and is very beneficial to our studies like doing paper works and at the same time, entertainment. But as computers became more popular, some students overused it and become a bad leisure for them causing them to skip their classes, they could not concentrate, and they become irresponsible, they didn’t do their school stuffs and obliviously overspending their allowance in paying a gaming computer unit and a bet. Lessen, determine and prevent computer addiction, are in the mind of the researchers in conducting this study. STATEMENT OF THE PROBLEM The primary aim of this study is to obtain......

Words: 615 - Pages: 3

Premium Essay

National Conference on Research Trends in Computer Science and Technology

...International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY (M.Tech) Email: MR. M. MADDHUSUDHAN REDDDY M.TECH Email: Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM. II. THE CHARACTERISTICS OF THE SYSTEM DESIGN The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is......

Words: 2126 - Pages: 9

Premium Essay

Unit 9 Research - Computer System Build

...John Doe ACME Computers 1234 Computer Dr City, CA 95555 November 29, 2014 John Smith CIO 1234 Computer Project Dr City, CA 95555 Dear John Smith: I have prepared the following bill of material for the computer hardware that you requested. The computers that I have assembled will provide the employees with ample computing power to keep them productive and quality components to reduce downtime. I was able to stay under your budget of $1,000.00 per machine, these come with Windows 7 Professional for ease of administration. However, all office productivity software will need to be installed upon delivery using your existing site license for the various software programs that the employees will need. OBJECTIVE I’ve assembled computers that cost under $1,000.00 each, including shipping costs. The computers use quality components from reputable manufactures. I’ve chosen AMD 3.9GHz processors w/ onboard graphics accelerator to reduce cost due to the fact that your employees will not require high end graphics rendering. This processor will provide years of reliable service and will not require upgrade as your software needs mature. I chose to provide 16GB of RAM to enhance the user experience during multitasking. I used two 8GB DIMMs with two open slots to provide for future upgrades when needed. The processor and chipset will support up to 64GB of memory if you should ever need that much. I used 10,000RPM, 500GB hard drives to provide quick access to files when......

Words: 800 - Pages: 4

Premium Essay

Computer Assisted Language Learning Research Paper

...The emergence of CALL CALL Stand for : Computer Assisted Language Learning . The search for and programs of the computer in language teaching and learning . Introduction t has been over 50 years since the emergence of computer-assisted language learning (CALL) that would forever change how second/foreign languages are taught. This article presents a historical overview of the evolution of CALL from the previous years of the mainframe computer to the integrative technologies of the 21st century. It examines the evolution of the dual fields of educational technology and second/foreign language teaching as they intertwined over the last half of the 20th century into present day CALL. The paper describes the paradigm shifts experienced along thisjourney...

Words: 867 - Pages: 4

Free Essay

Chapter 1 in Research About Computer Games Addiction

... * This is a state of opposition, disagreement or incompatibility between two or more people or groups of people, which is sometimes characterized by physical violence. * It is also an inevitable part of our life. * TYPES OF CONFLICT A. Approach-approach conflicts * Occur under two conditions: people attracted about equally to goals. But, carrying out one goal means abandoning the other. Example: You have to choose between buying a car or travelling to Europe. On the same night you want to attend a party and a movie. * Research suggest that approach-approach conflict are easier to resolve than any other type. B. Avoidance-avoidance conflict * When a person is simultaneously repelled by two goals and obliged to select one. * This conflict arouse a great deal of anxiety typically, and they are difficult to resolve. Example: you must choose to clean your room or do the dishes. * Research shows that as organism approach an unattractive choice, it becomes more repellent. C. Single approach-approach conflict * When a person is attracted to and repelled by one goal. Example: An otherwise appealing career may require a lot of education. A luxurious car is costly. Should I have the dentist take care of my cavity? * These conflicts also are difficult to resolve and generates much anxiety. D. Double approach-avoidance conflict * Have two goals, each with good and bad points. Example: Should I go out with......

Words: 429 - Pages: 2

Premium Essay

Termpaperwarehouse.Com - Free Term Papers, Essays and Research Documents the Research Paper Factory Joinsearchbrowsesaved Papers Home Page » Computers and Technology Tablet in: Computers and Technology Tablet - Free Term Papers, Essays and Research Documents The Research Paper Factory JoinSearchBrowseSaved Papers Home Page » Computers and Technology Tablet In: Computers and Technology Tablet Tablet computer iPad (1st generation), a tablet computer A tablet computer, or simply tablet, is a mobile computer, larger than a mobile phone or personal digital assistant, integrated into a flat touch screen and primarily operated by touching the screen and instead of using a physical keyboard it often uses an onscreen virtual keyboard. A tablet computer may be connected to a keyboard with a wireless link or a USB port. Convertible notebook computers have an integrated keyboard that can be hidden by a swivel joint or slide joint, exposing only the screen for touch operation. Hybrids have a detachable keyboard so that the touch screen can be used as a stand-alone tablet. Booklets include dual-touchscreens, and can be used as a notebook by displaying a virtual keyboard in one of them. An early information tablet concept, named the Dynabook, was described by a Xerox scientist Alan C Kay, in his Aug 1972 paper: A Personal Computer for children of all Ages, the paper proposes a touch screen as a possible alternative means of input for the device. The first commercial portable electronic tablets appeared at the end of the 20th century. In 2010, Apple Inc. released the iPad which became the first mobile computer tablet to achieve worldwide commercial......

Words: 358 - Pages: 2