Ict Computers

Page 45 of 50 - About 500 Essays
  • Free Essay

    Project

    really like) Unexcited | | 1 2 3 4 5 | Exciting | Bad | | 1 2 3 4 5 | Good | Boring | | 1 2 3 4 5 | Interested | 5. Are the computer available there fully facilitated with software & hardware? 6. Do you think that number of working computer systems available in net café are enough as compare to number of students who visit net café? Yes No Don’t Know 7. On an average how many hours does it take to download

    Words: 500 - Pages: 2

  • Premium Essay

    Cibs

    BARCODING SYSTEM(CIBS) A Thesis Presented to the Faculty of College of Computer Science Palawan Polytechnic College In Partial Fulfilment Of The Requirements for the Degree Bachelor of Science in Computer Science By: Gregorio, Diana Rose L. Pulido, Ava Krisha L. March, 2015 Chapter 1 Introduction Now a day we are living in a modern world in which technology affects in the lives of people. As a proof of modernization, computers had been developed. It greatly affects our lifestyles, our health, communication

    Words: 1136 - Pages: 5

  • Premium Essay

    Student Habits

    The Advantage and Disadvantage of Technology I. Introduction Nowadays, many people specially the students are using technology such as cellphone, tablet and computers. Some says that the technology has a disadvantage to the people because they are making themselves lazy but other says that technology can help the people to make their work easier. II. Body Technology is one of the most important thing in our society. The advantages of it are: reach a much larger audience from greater geographic

    Words: 299 - Pages: 2

  • Free Essay

    Memory Management

    computer’s memory, this basically means the steps necessary to provide ways of allocating portions of memory to programs at their request and feeing it up for reuse when no longer needed (Stallings, 2012). This management system is critical to the computer system. In order for memory management to multi-task it must utilize and deal with the six requirements of memory management. The first one of these requirements utilized is the relocation of memory. Relocation of memory pertains to programs that

    Words: 663 - Pages: 3

  • Premium Essay

    Dns and Dhcp

    system administrator's life simpler and easier. Fortunately, the protocols are so flexible that they can be implemented either together or separately depending on the size and configuration of your enterprise network. So whether you have 5 or 5000 computers in your network this would be justifiable action because of the following reasons: Looking up IP addresses can be a nightmare if you have more than a couple to remember If you have network-enabled printers, unless you lock the address, it will change

    Words: 274 - Pages: 2

  • Free Essay

    Iinformation Management

    Question 1: What is the nature of Information? Explain how individuals interpret data to become information. Answer: Data that is (1) accurate and timely, (2) specific and organized for a purpose, (3) presented within a context that gives it meaning and relevance, and (4) can lead to an increase in understanding and decrease in uncertainty, is called an information. Information is valuable because it can affect behavior, a decision, or an outcome. For example, if a manager is

    Words: 2607 - Pages: 11

  • Free Essay

    Tech

    It is because DMA is an essential feature of all modern computers. It allows devices to transfer data without subjecting the CPU to a heavy overhead. Otherwise, the CPU would have to copy each piece of data from the source to the destination, making the CPU unavailable for other tasks. This situation is aggravated because access to I/O devices over a peripheral bus is generally slower than normal system RAM. With DMA, the CPU gets freed from this overhead and can do useful tasks during data

    Words: 301 - Pages: 2

  • Premium Essay

    Computer Science

    Von Neumann was a founding figure in computer science.[49] Von Neumann's hydrogen bomb work was played out in the realm of computing, where he and Stanislaw Ulam developed simulations on von Neumann's digital computers for the hydrodynamic computations. During this time he contributed to the development of the Monte Carlo method, which allowed solutions to complicated problems to be approximated using random numbers. He was also involved in the design of the later IAS machine. Because using lists

    Words: 625 - Pages: 3

  • Free Essay

    Ethics

    digital information stored on a card can be counterfeited. Of course, we don't need Willie Sutton to remind us that banks are where they keep the money. In 1994, a Russian hacker Vladimir Levin, operating from St Petersburg, accessed the computers of Citibank's central wire transfer department, and transferred funds from large corporate accounts to other accounts which had been opened by his accomplices in The United States, the Netherlands, Finland, Germany, and Israel. Officials from one

    Words: 2042 - Pages: 9

  • Premium Essay

    Database

    A database is an organized collection of data. The data are typically organized to model relevant aspects of reality in a way that supports processes requiring this information. For example, modeling the availability of rooms in hotels in a way that supports finding a hotel with vacancies. Database management systems (DBMSs) are specially designed applications that interact with the user, other applications, and the database itself to capture and analyze data. A general-purpose database management

    Words: 771 - Pages: 4

Page   1 42 43 44 45 46 47 48 49 50