Computer Science Essays, Research Papers & Term Papers (1,643) essays
- Artificial Intelligence (60)
- Computer Ethics (118)
- Internet and networking (465)
- Programming Languages (69)
Computer Science essays:
Computer in Nowadays
... business-to-business context appears to be rapidly gaining momentum. In recent years, 'the Department of Defense has turned the Internet over to commercial users'. As a result, its current use has increased significantly in business-to-consumer transactions and in business-to-business transactions ...
Logical Database Design.
... logical design is one of the first important steps in designing a database. There are four logical database models that can be used hierarchical, network, relational, or object-oriented. 1.Hierarchical: The first important logical database model. Still found in many mainframe-based, legacy systems ...
Apple and the Mac
... computer: is a microcomputer that uses GUI. Factor which made The Lisa expensive when it was released It was based around the powerful Motorola 68000 microprocessor (Apple use Motorola chips instead of Intel ones) It required 1 megabyte of memory (a lot at the time) It needed a hard drive ...
Why you should purchase a PC
... productivity and game playing whereas Windows NT is more business orientated. The article entitled 'Mine, All Mine' in the June 5, 1995 issue of Time stated that 8 out of ...
The History of Computers (1946-1992)
... Apple II could be purchased for a low price of $1298, and had sold over 8 million in eight years. WORM (Write Once, Read Many) was the first optical data storage disk of 1980, and it held about 1.3 gigabytes of ...
Systems Analysis-Lifecycle Models and Methodologies
... logical design. The user manual and the test plan are defined. Getting the processes correct and the data right are two of the key features of SSADM. Data flow modelling is used to describe the current physical system, moving through to the required system. This is normally in the form of Data ...
Hiding Behind a Computer.
... of harassment are routinely dismissed with the logic that this is a fantasy space so anything goes. This displays how easy it is to perform cyber-rape on an individual. An interesting point is made by Jodi Orien in her article ...
The dinosaur that refuses to die - IBM Servers
... data that thousands in this country flashed, as their credentials to be considered for a job in the Information Technology arena. Before the System 360, programming method for commercial and scientific machines was different. IBM offered the 1401 series for business ...
Evaluating IT Service Management Standards in an Operation.
... of the company. Databases that are used include warehouse management systems able you to access stock locations in warehouses, stock movement, inventory - writing stock onto system and writing off, enter new products and check for customer orders. The IT applications that drive the business ...
Executive Summary - CIS 350 University of Phoenix
... productivity and higher employee morale. Also, the company's bottom line will benefit generously from increased profits. Business Requirements for Riordan Manufacturing Service Request The recommended use of the System Development Life Cycle process (SDLC) has been made to propose and design ...