Computer Technology -- Software Application Research Paper


The various options and possible settings pertain to issues that most computer users do not even know exist, let alone what they do or how they interrelate with other elements of the computer (Kizza, 2005). About the only time most computer users ever view or make changes to system software settings is during troubleshooting and diagnostic procedures at the direction of computer specialists or technicians (Kizza, 2005). Typical examples of the way that most computer users access system software settings is when they are experiencing computer problems and technicians relay instructions for users to follow (usually over the telephone) so that the technician can conduct standard system setting and software conflict checks remotely. Usually those types of service calls begin with the technician instructing the user to determine the computer's operating system by clicking the "My Computer" icon, then "Properties" and then the "General" tab to identify the operating system (Kizza, 2005).

The only other...


Sometimes new software applications (as well as new computer hardware) can require system setting changes to accommodate those new applications or hardware without causing a conflict with existing system. Computer users also routinely update or change the specific program applications on their computers based on what kind of work they are doing and what types of things they wish to do with their computers. They rarely make changes to the operating system software because it runs strictly "in the background" so to speak.

Sources Used in Documents:


Evans, H. (2004). They Made America: From the Steam Engine to the Search Engine

Two Centuries of Innovators. New York: Little Brown & Co.

Kizza, J.M. (2005). Computer Network Security. New York: Springer.

Cite this Document:

"Computer Technology -- Software Application" (2010, September 10) Retrieved April 17, 2024, from

"Computer Technology -- Software Application" 10 September 2010. Web.17 April. 2024. <>

"Computer Technology -- Software Application", 10 September 2010, Accessed.17 April. 2024,

Related Documents

It is likely that this trend will continue along the same lines as other technologies; just as telephones, the Internet, and cell phones each individually became more or less essential parts of living in Western society, the web-enabled cell phone will almost certainly be just as essential to conducting business and daily life in the next decade. For the majority of citizens in the Western -- and as increasingly the

The real-time integration to memory management that would lead to rapid advanced in superscalar memory management made possible with RISC-based microprocessors and memory however continued to be driven by IBM and their partners working in conjunction with each other on new developments (Biswas, Carley, Simpson, Middha, Barua, 2006). Implications of RISC Development on Memory Management Advances Over the first twenty five years of RISC processor and memory development the key lessons

Computer Technology Technology and Writing in the Workplace Over the last decade there has been a significant change in technology which is available in the workplace, and the way that technology is used. The computer has been credited with having the potential to create a paperless society, and many written communications are no longer printed on paper, but communicated in electronic format. This movement towards electronic written communication, where communication takes place

The first such machine used for the procedures, the CEREC I, was used for manufacturing ceramic and cusp-protection onlays, three-quarter crowns, seven-eighth crowns, and veneers. The machine completed the etching, silanating, and adhesive cementing, and then conventional porcelain-polishing procedures were used to complete the process. The newer CEREC II system can create full-coverage ceramic crowns (Foerster 2). Beyond the greater technological ease, using such machines reduces the risk of tooth

A repeated-measures field study (n = 316) investigated the effect of mood on employee motivation and intentions toward using a specific computer technology at two points in time: immediately after training and 6 weeks after training. Actual usage behavior was assessed for 12 weeks after training. Each individual was assigned to one of three mood treatments: positive, negative, or control. Results indicated that there were only short-term boosts in intrinsic

Unsophisticated biometric systems are already available at relatively affordable prices but they are unsuitable for many sensitive assets and applications. Sufficiently sophisticated biometrics systems to safeguard highly sensitive assets and information systems are comparatively cost prohibitive for small and medium-sized business entities (Mills & Byun, 2006). For example, fingerprint biometric identification systems are perfectly appropriate for low-level information systems and assets, particularly where those systems are used I conjunction with