|
Essays on Computers
Title: The Power On Self Test
Details: Words: 1575, Pages: 6... if you bend the CMOS settings right
out of shape and the computer won't boot properly anymore. This is also a handy
tip for people who play with the older AMI BIOSes with the XCMOS setup. It
allows changes directly to the chip registers with very little technical
explanation.
A Typical BIOS POST Sequence
Most BIOS POST sequences occur along four stages:
1. Display some basic information about the video card like its brand,
video BIOS version and video memory available.
2. Display the BIOS version and copyright notice in upper middle screen.
You will see a large sequence of numbers at the bottom of the screen. This
sequence is the .
3. Display memory cou ...
|
Title: The Arrival Of Email
Details: Words: 439, Pages: 2... organizational managers are finding that E-mail archives and files are
telling sources of information about an organization's policies and actions.
In the antitrust case against Microsoft "E-mail messages dashed off years
ago by the Microsoft Corp. chairman and his top lieutenants now figure
prominently as digital "smoking guns" . . . Trustbusters say electronic
messages, perhaps more than any paper document, could help them prove that
Microsoft sought to crush competitors and monopolize access to the
Internet." However, Microsoft is not alone. Morgan Stanley Dean Witter & Co.
recently agreed to settle a discrimination lawsuit initiated by employees.
"The smoking gu ...
|
Title: Response To AOL Controversy
Details: Words: 702, Pages: 3... $15
dollars as opposed to AOL's hefty $19.95 a month. AOLers are paying for the
appealing menus, graphics and services AOL uses to drive their customers to the
internet. These same features can be located anywhere else on the net with the
aid of any search device, such as infoseek, yahoo, microsoft network or web-
crawler. These sites are no harder to use and they provide lots of helpful
menus and information.
In Wood's article, he states that he lives in Chicago, and AOL has
several different access numbers to try if one is busy. He writes that often
when he has tried to log on using all of the available numbers, and has still
been unsuccessful. This is a pr ...
|
Title: Computer System Analysts
Details: Words: 1669, Pages: 7... world demands the competitive organization
employs computer systems analysts in order to integrate their information, management, accounting, manufacturing and distribution sales systems. This analysis will describe the typical responsibilities of the computer systems analyst, including the job market and outlook for the career that may be one of the most misunderstood occupations in modern times.
The computer systems analysts is often misunderstood because they speak a techno-language that sounds more Greek than Greek, with common words like Sat, FoxPro, VB-4, C++ Himmelberg (8G), often leaving non-analysts scratching their heads. However, the devel ...
|
Title: High And Low Displacement Engines
Details: Words: 369, Pages: 2... and stronger engine, which makes it possible for the car to maintain a high speed. In other words, the Integra would win in a 1/4-mile drag race but the Mustang would win in a race that’s longer than a 1/4 of a mile. They can also be made to produce as much power as a large engine but the engine life would be reduced due to the stress.
The advantage of small displacement engines is that they are fuel efficiency and weigh less than larger engines. The small displacement engine can also be modified to gain more power but the engine life is also reduced. The larger displacement is stronger and it can handle more modification but it still cannot accelerate as fas ...
|
Title: BBS Piracy And The Copyright
Details: Words: 1083, Pages: 4... concern from the users who stated that they were not
sure whether this software could be distributed electronically.
Yves Roy, sergeant of RCMP stated that charges will be laid in early
December under paragraph 42 of The Copyright Act. Conviction under this
act carries a maximum punishment of a fine of $1 million dollars, and/or 5
years imprisonment.
Because newspaper articles are very biased in one point-of- view, it
is difficult to look at both sides of this situation. But let us discuss
piracy in a more general manner. Software piracy is the act in which
someone takes a copyrighted portion or whole of software, then
electronically copies and/or d ...
|
Title: Computer Security
Details: Words: 2496, Pages: 10... the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in th ...
|
Title: Cognitive Artifacts & Windows 95
Details: Words: 854, Pages: 4... explorer, you click on the icon answer the wizard's questions and
the computer performs the work. Making sure everything is setup properly
without the errors that could occur in configuring the task yourself. The
wizard performs all the functions on its little to-do list without having the
user worrying about whether he/she remembered to include all the commands. On
the side of personal views the user may see the wizard as a new task to learn
but in general it is simpler than having to configure the application yourself
and making an error, that could cause disaster to your system. The wizard also
prevents the user from having to deal with all the internal ...
|
Title: Information About Viruses
Details: Words: 326, Pages: 2... have good virus protection. On IBM-Compatible PCs, viruses will only
infect executable programs, such as the .EXE and .COM files. On a Macintosh, any
file can be contaminated. A disk can also be infected even without any files on
it. These viruses are called BOOT SECTOR viruses. These viruses reside on the
part of the floppy disk, or hard disk that store the information so that these
disks can be used, and is loaded into memory each time the computer is booted by
one of these disks.
DON'T DESPAIR!
Despite all of what has just been said, viruses are controllable. Their is
software called Virus Protection Software. A couples of progr ...
|
Title: Computer System In The Context Of Retail Business
Details: Words: 1328, Pages: 5... customers
purchasing goods. Absolut Software, provides a host of state-of-the-art
capabilities vital for increasing sales and productivity. Absolut Software will
easily reduce the number of operators and supporting hardware by 15 percent.
Absolut Software provides a training mode for novices and a high-speed mode for
the experienced.
Features: * Complete mailing list management * Promotion tracking * Catalog and
telemarketing * Importing sub-system * On-line order entry * Inventory control
(multi-site, serialized, lot number, decimal quantities, and style-color-size) *
Credit card billing * Computer-driven in-store POS with "Suspend and Hold;"
availability displ ...
|
Browse:
« prev
14
15
16
17
18
19
20
21
22
23
next »
|