Computer System Essays (Examples)

1000+ documents containing “computer system”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Computer System Administrator Systems Administrator
Pages: 4 Words: 1661

etrieved from http://books.google.co.ke/books?id=3Tla6d153uwC&printsec=frontcover&dq=Encyclopedia+of+computer+science+and+technology&hl=en&sa=X&ei=dZH_UNjcIcHQhAeg4C4Bw&ved=0CCwQ6AEwAA
Kizza, J.M. (2005). Computer Network Security. New York, NY: Springer. etrieved from http://books.google.co.ke/books?id=HsawoKBLZOwC&printsec=frontcover&dq=Computer+Network+Security&hl=en&sa=X&ei=uZH_UJn-NMbNhAeWroDYCA&ved=0CCwQ6AEwAA#v=onepage&q=Computer%20Network%20Security&f=false

Musumeci, G.-P. D., & Loukides, M. (2002). System performance tuning: [help for Unix system administrators]. Beijing [u.a.: O'eilly. etrieved from http://books.google.co.ke/books?id=L4oyNrsFBbsC&printsec=frontcover&dq=System+performance+tuning&hl=en&sa=X&ei=C5L_UKjmNonMhAen8ICoBw&ved=0CDIQ6AEwAA

Adelstein, T., & Lubanovic, B. (2007). Linux system administration. Sebastopol, Calif:

O'eilly. etrieved from http://books.google.co.ke/books?id=-

jYe2k1p5tIC&printsec=frontcover&dq=Advanced+system+administration&hl=en&sa=X &ei=fpP_UM6EN8HMhAff9YC4DQ&ved=0CD0Q6AEwBA#v=onepage&q=Advanced

%20system%20administration&f=false

Verma, D.C. (2009). Principles of computer systems and network management. Dordrecht: Springer. etrieved http://books.google.co.ke/books?id=dUiNGYCiWg0C&printsec=frontcover&dq=Principles+of+computer+systems+and+network+management&hl=en&sa=X&ei=i5T_UIG3IMaBhQfF2YD4Bg&ved=0CDQQ6AEwAA#v=onepage&q=Principles%20of%20computer%20systems%20and%20network%20management&f=false

Whyte, E. (2004, Feb 09). Be a system administrator. New Straits Times. etrieved from http://search.proquest.com/docview/271766591?accountid=35812...

mla
Essay
Cbu Installed a Computer System Tracking Calculating
Pages: 2 Words: 636

CBU installed a computer system tracking calculating inventory costs. On December 31, ye
In my opinion, it would be relatively easy to explain the diverse opinions regarding the efficacy of the new computer system for tracking and calculating inventory costs at CBU. There is actually a degree of rectitude found in the opinions of both accountants A and B. There certainly is validity to accountant A's viewpoint: that the auditing team was able to find a discrepancy between the amount of the physical inventory and that which was recorded on the new system for this organization (the difference was a million dollars). It certainly would not have been prudent to be unaware of such a discrepancy, and to have the books erroneously balanced due to such an error. Therefore, from this basic perspective accountant A actually has a good point.

However, it largely appears as though this accountant has taken the…...

Essay
Protection of Computer Systems
Pages: 4 Words: 1281

System Security and Internet Privacy
Personal computers have become an important component of today's society given their role in helping stay connected with the contemporary world. Actually, computers are currently used for a wide range of purposes and across a variety of settings. Consequently, computers are used to keep personal information, which implies that they have become critical parts of everyday life. However, the use of computers requires ensuring privacy in order to guarantee the security of information. Computer users are constantly faced with the need to ensure the security of their systems through implementing various measures towards systems security.

System Security

I have just received a new computer for my home environment and can easily connect to the Internet and perform some online banking through the already existing Internet Service Provider. However, I need to ensure systems security in order to promote security of personal information, especially banking information. The first step…...

mla

Reference

Kent, J. & Steiner, K. (2012). Ten Ways to Improve the Security of a New Computer. Retrieved from United States Computer Emergency Readiness Team website: https://www.us-cert.gov/sites/default/files/publications/TenWaystoImproveNewComputerSecurity.pdf

Essay
Computer Systems Are Used One Has to
Pages: 8 Words: 2506

computer systems are used, one has to delve a it deeper into how those issues occur and what they mean for the people who use computers. Addressed here will e a critique of two articles addressing DNS attacks and network intrusion detection, in order to determine the severity of the issues these attacks are causing and what can e done in order to lessen the risks and protect the data of more individuals and companies.
Jackson, C., Barth, A., Bortz, A., Shao, W., & Boneh, D., (2009). Protecting rowsers from DNS reinding attacks. ACM Transactions on the We, 3(1): 1-26.

Jackson, et al. (2009), provides information on the use of DNS reinding attacks, which are generally unexpected y the users who experience them and can e very devastating. Many firewalls and other protection options do not work against DNS reinding attacks, ecause the rowser is fooled into thinking that the wesite…...

mla

bibliography that provide a great deal of knowledge about the subject at hand, and that provide it in such a way as to be easily understood. These include:

Bace, R.G. (2000). Intrusion Detection. Macmillan Technical Publishing, Indianapolis, IN, USA.

Coit,, C.J., Staniford, S., & McAlerney, J. (2001). Towards Faster Pattern Matching for Intrusion Detection or Exceeding the Speed of Snort. In Proc. 2nd DARPA Information Survivability Conference and Exposition.

Haines, J., Rossey, L, Lippmann, R., & Cunningham, R. (2001). Extending the 1999 Evaluation. In Proc. 2nd DARPA Information Survivability Conference and Exposition.

Discussion and Conclusion

Essay
Computer Systems Are Increasingly Being Used to
Pages: 6 Words: 1916

computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of "coordinated attacks to specific critical sectors of a country" (Edwards, 2014, p. 67). The key aim of such attacks is usually sabotage or espionage. This text concerns itself with cyber warfare. In so doing, it will amongst other things analyze a journal article titled, Stuxnet: Dissecting a Cyber Warfare Weapon, by alph Langner. More specifically, the text will conduct a technical analysis of the said article and discuss not only the offensive and defensive Cyberware strategy, but also make recommendations…...

mla

References

Edwards, M. (Ed.). (2014). Critical Infrastructure Protection. Fairfax, VA: IOS Press.

Global Research- Center for Research and Globalization (2013). U.S.-Israeli Stuxnet Cyber-attacks against Iran: "Act of War." Retrieved from  http://www.globalresearch.ca/us-israeli-stuxnet-cyber-attacks-against-iran-act-of-war/5328514 

Langner, L. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. Retrieved from  http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5772960&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5772960 

Rosenzweig, P. (2013). Cyber Warfare: How Conflicts in Cyberspace are Challenging America and Changing the World. Santa Barbara, California: ABC-CLIO.

Essay
Small Computer Systems Proposed Research
Pages: 15 Words: 4808

According to aul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps.
In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and remained vendor specific; the 802.11 protocol representeded an important step towards standardization (assmore, 2000). Wireless local area network (LAN) technology, however, has actually been in use since the late 1980s; different proprietary approaches were commonly used, and the networks operated at lower speeds (e.g., 1-2 Mbps). In 1997, though, the standards setting body, IEEE, released the 802.(11) standard for wireless local area networking using the unlicensed 2.4 GHz frequency band (as opposed to the 900 MHz band used in the…...

mla

Passmore, D. (2000, March). Wireless LANs Come of Age. Business Communications Review, 30(3), 22.

Vance, a. (2002, August). Variations on 802.11: Here Are 802.11's a, B, G's, and Other Things You Never Learned in School about Wireless LANs. Business Communications Review, 32(8), 36.

Weiser, M. (1998). The future of ubiquitous computing on campus. Communications of the ACM, 41, 41-42.

Essay
Human Element Computer Systems Design Has Come
Pages: 6 Words: 2263

Human Element
Computer systems design has come a long way from the time when Dijkstra first began exploring time sharing mechanism in the workings of the keyboard. In his day, computers were the realms of scientists and technical people. Operating systems designers were more concerned with processing ability. Human factors and "user friendliness" were terms that would not be a part of their vocabulary for many years to come. At the time of their early work, most of the population was still amazed at the automatic toaster and the television. Many early designers did not think about the common person eventually becoming a consumer of their product in a major way.

Dijkstra had vision beyond his time period and was one of the first to consider human factors in systems design. The first concept to be considered was the reduction of time spent waiting for the system to process the line…...

mla

Works Cited

Bertrand, Meyer: "Proving Pointer Program Properties. Part 1: Context and overview," in Journal of Object Technology, vol. 2, no. 2, March- April 2003, pp. 87-108.   2003)http://www.jot.fm/issues/issue_2003_03/column8 .(March,

Bunge M. (1977). Ontology I: The Furniture of the World, Vol. 3 of Treatise on Basic Philosophy. Dordrecht and Boston: Reidel.

Dijkstrra, Edsger. My Recollections of Operating System Design. Manuscript.

Department of Computer Sciences. University of Texas at Austin. (October, 2000/April, 2001) EWD1303   (March, 2003)http://www.cs.utexas.edu/users/EWD/ewd13xx/EWD1303.PDF 

Essay
New Computer Systems for a Nostalgia Record
Pages: 2 Words: 580

New Computer Systems
For a Nostalgia Record Store

Nostalgic Record Store Information Systems Proposal and Plan

Strengths and Weaknesses of Recommended Information Systems

Comparing Record Store Computing Systems Cost and Benefits

Baby Boomers who are nostalgic for music from the 60s, 70s and 80s are a lucrative market for a record store. Many of these music fans are also big fans of the classic nostalgic music from the 1950s, which include many of the classic rock and roll pioneers including Elvis Presley, early Johnny Cash recordings, Richie Valens and Buddy Holly. he demand for music from these periods is very high given the tendency on the part of people in general and Baby Boomers specifically to prefer music from less complicated times.

What's very important to realize about these purchasers is they have a completely different series of information channels they go through to learn about music vs. how they buy. While the new store…...

mla

The strengths (benefits) and weaknesses (drawbacks) of these systems are discussed in the next section of this paper.

Strengths and Weaknesses of Recommended Information Systems

Beginning with the Catalog Management & E-Commerce website system, the advantages or strengths is the ability to automate the entire website incouding catalogs and pricing for all items online. There is also the advantage of creating online specials and getting customers to opt in for specials and to create profiles showing their specific interests in music. This system will help with search engine optimization (SEO) to make sure the store shows up in searches. The disadvantage's are that these systems can be expensive and often are hosted on servers at 3rd party companies incouding Yahoo or Google. This means it is difficult to recover data or if the system crashes, recreating it can take a lot of time. The second systems is the Checkout or Selling System which is the cash register tied back to the central system running the store. The advantages of using this type of system is that all transactions can be quickly captured and recorded directly into the accounting system. Another advantage is the ability to quickly update inventory and pricing for new products. The disadvantages are the cost and the need for having a small network running the TCP/IP protocol throughout the store to enable this system to integrate with the General Ledger system (Bagchi-Sen, Kuechler, 2000). The third systems General Ledger systems are indispensable in running any business, and for the development of an effective series of financial statements, this system is critical. The advantages are better control of finances than any other approach that is manually based, greater support for banking tasks, and more efficient use of existing cash on hand by knowing the exact status of accounts (Bagchi-Sen, Kuechler, 2000). The disadvantages of this type of system include the lack of visibility into the

Essay
System Proposal Computer System Proposal
Pages: 1 Words: 305

As many of the components of our current computer system are more than five years old, there could be a significant cost savings produced by replacing and updating the system, in addition to the extra revenue generated by increased productivity (Meredith, 2010).
I have already begun preliminary investigations as to some of the specific components, processes, and features that might be desirable in this new system, and am awaiting your approval to conduct further research and feasibility analysis with this project, to eventually lead to the development and implementation of the system. I am very optimistic that this project could ultimately help to drive this company to new heights, capable of more fully capitalizing on emerging opportunities.

Respectfully yours,

Mr. Cubicle...

Essay
Computer System and Computer
Pages: 2 Words: 630

Penetration Testing
The use of penetration testing to test the security and safety of a network is a common practice among many firms. It is further often normal to not inform the relevant staff and personnel behind a network about what is about to occur so that they are truly tested based on what they would normally be doing. However, there are legal and other minefields to doing such testing and all of the people involved need to be careful to cross all the t's and dot the I's before getting too deep into such testing. While penetration testing needs to be as complete and realistic as possible, there are some precautions and other steps that must be taken.

Best Practices

As one might expect, the big thing to have when it comes to penetration testing is permission to so do. However, it is important to define what that means in the context…...

mla

References

Iron Geek. (2017). State Hacking/Computer Security Laws. Irongeek.com. Retrieved 8 May 2017, from  https://www.irongeek.com/i.php?page=computerlaws/state-hacking-laws 

Kassner, M. (2017). Don't let a penetration test land you in legal hot water - TechRepublic. TechRepublic. Retrieved 8 May 2017, from  http://www.techrepublic.com/article/dont-let-a-penetration-test-land-you-in-legal-hot-water/

Essay
Computer-Based Crime
Pages: 4 Words: 1254

Computer-Based Crime
The illegal site I reviewed for this assignment is www.howtogrowmarijuana.com. This site covers virtually all aspects of marijuana growing -- which is an illegal activity because marijuana is widely outlawed in the United States. However, there are some states in which individuals can legally consume marijuana for medicinal purposes. In these states and others there exists the potential for businesses to legally supply this substance to people.

There is a large degree of transparency in this particular web site. It was the first result to appear with a Yahoo search for "How to grow marijuana." As the tile of the site suggests, it discusses many different facets of growing marijuana and stratifies this process according to location (indoor or outdoors), various strains of marijuana including seeds (No author, 2014), irrigation and growth systems involving hydroponics, and other germane equipment types such as the expensive lights used to assist marijuana growth.…...

mla

References

Faris, S. (2013). Have the NSA leaks compromised Big Data's future? www.dataversity.net Retrieved from  http://www.dataversity.net/page/2/?s=stephanie+faris 

No author. (2014). Marijuana seed strains review. www.howtogrowmarijuana.com Retrieved from  http://howtogrowmarijuana.com/all-marijuana-strains.html 

Romero, R. (2011). Craigslist illegal drug trade exposed. www.abc7.com

Retrieved from  http://abc7.com/archive/8132665/

Essay
System Security Every Organization Which
Pages: 9 Words: 2884

Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.)
Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it can become a target for stealing identities. All types of servers, which include file, database, web, email and infrastructure management servers are vulnerable to security attacks with the threat coming from both external as well as internal sources.

Some of the server problems that can jeopardize its security include: (i) Weakly encrypted or unencrypted information, especially of a sensitive nature, can be intercepted for malicious use while being transmitted from server to client. (ii) Software bugs present in the server Operating…...

mla

References

Bace, Rebecca Gurley; Bace, Rebecca. (2000) "Intrusion Detection"

Sams Publishing.

Fortify Software Inc. (2008) "Fortify Taxonomy: Software Security Errors" Retrieved 17 November, 2008 at  http://www.fortify.com/vulncat/en/vulncat/index.html 

Fortify Software. (n. d.) "Seven Pernicious Kingdoms: A Taxonomy of Software Security

Essay
Computer Charting's Effect on Nursing
Pages: 5 Words: 1392

(Andrews, 1985)
The study found that computer charting was well accepted by therapists. "Charge capture was reduced from a four-step manual process to a single-step computer documentation of the procedure. Computer charting was more complete and informative. Productivity increased 18%, although it remains unclear to what degree the computer was responsible." (Andrews, 1985)

In conclusion, the study determined that computer charting streamlined the process of documentation and allowed more beneficial use of clinical information. (Andrews, 1985)

In other words, the study fell in line with the later Cunningham study in that they both noted that computer involvement in various stages of health care provision via computer charting truly benefits the health care provider and the patient. In addition, it streamlines costs and eliminates costly errors.

College health systems benefit especially from computer charting, according to Carol Mulvihill, R.N.,C., CQ Editor and Director of Health Services, University of Pittsburgh at radford. She notes that…...

mla

Bibliography

Andrews, RD, et al. 1985. Computer charting: an evaluation of a respiratory care computer system. Respir Care. 1985 Aug;30(8):695-707.

Cunningham, S, et al. 1996. Comparison of nurse and computer charting of physiological variables in an intensive care unit. Int J. Clin Monit Comput. 1996 Nov;13(4):235-41.

Medinotes: 2005. Charting Plus. www.medinotes.com

Mulvihill, Carol. 1997. Advantages of computerized charting in college health. University of Pittsburgh: CQ.

Essay
System Development Life Cycle SDLC
Pages: 5 Words: 1611

However, the company did feel it should develop its own Database infrastructure that would work with the new underlying database management system and would mesh with existing organizational skills and the selected enterprise software solution.
Because the company followed a standardized implementation process, they were able to successfully reengineer their existing business structure. The objective of the System Development Life Cycle is to help organizations define what an appropriate system development methodology should be in order for them to continue to meet the rapidly changing business environment. The specific research approach employed by International Lumberyards, Inc. was to follow the steps of the cycle and it helped them dramatically.

Conclusion

This report attempted to analyze a work-related project that used a systems analysis tool for a specific business system. The report focused on the use of the System Development Life Cycle to implement a business or information technology need as well as…...

mla

References

Grabski, Severin V. (2002). International Lumberyards, Inc.: An Information System Consulting Case. Journal of Information Systems, 9/22.

Knight, Ph.D., Linda V. (2001, November 1). System Development Methodologies for Web Enabled E-Business: A Customization Paradigm. Retrieved January 16, 2005, at http://www.kellen.net/SysDev.htm

Peacock, Eileen (2004). Accounting for the development costs of internal-use software. Journal of Information Systems, 3/22.

Wikopedia. (n.d.). System Development Life Cycle. Retrieved January 16, 2005, at  http://en.wikipedia.org/wiki/System_Development_Life_Cycle

Essay
Computer How Soon Till
Pages: 8 Words: 3095

Moreover, it has also to be ensured that the motherboard contains expansion slots built into the board, and not built into the expansion board which plugs into the motherboard.
Memory: The memory located inside the computer is called as the andom Access Memory (AM). This AM is place where CPU temporarily stores information, which it needs to perform a function. The quantum of memory is directly related to the extent of complicated functions it is able to perform. It is important to get a system having at least 256 MBs AM or 512 MBs or higher is preferred. For the greater part, the more memory to which the system can be upgraded to in future is better. The latest software programs are always extremely resources hungry.

Input-devices: - Input devices are employed to enter information and direct the commands to your computer. The two most typical input devices are a keyboard…...

mla

References

Improve Your Computer's Performance. Retrieved at on 27 November, 2004http://h50055.www5.hp.com/smb/ph/resources/improve.aspxAccessed

Purchasing a Computer Investing in Your Career. Union Technologist. No: 52 January 2001. Retrieved at   on 28 November 2004http://www.chtu.org/Tech/Tech52.html#waitAccessed 

Purchasing a Computer System. The Computer Specialist. Retrieved at   Accessed on 28 November 2004http://www.coroneldp.com/Prchtips.htm .

Upgrading Your Computer Components. March, 2003. Retrieved at   on 27 November, 2004http://www.techsoup.org/howto/articlepage.cfm?ArticleId=142&topicid=1Accessed 

Q/A
How do trains adhere to standard time schedules when traveling across multiple time zones?
Words: 396

1. The Evolution of Trains: From Steam Engines to High-Speed Rail

2. How Trains Revolutionized Transportation and Shaped Standard Time

3. The Impact of Trains on Economic Growth and Urbanization

4. Standardizing Time: The Role of Trains in Establishing Coordinated Time Zones

5. The Transcontinental Railroad: Connecting a Nation, Unifying Time

6. From Greenwich Mean Time to the GMT+ Railway Standard: How Trains Set the Clocks

7. Trains and the Industrial Revolution: Timekeeping for Efficiency

8. The Influence of Trains on Social Life and Cultural Practices

9. The Romantic Era of Train Travel: Luxury, Speed, and Timekeeping

10. Trains and Standard Time in the Digital Age: Challenges and Innovations
11.....

Q/A
How do cyber hackers exploit vulnerabilities in computer systems to gain unauthorized access?
Words: 380

Cyber hackers exploit vulnerabilities in computer systems in various ways to gain unauthorized access, including:

1. Exploiting software vulnerabilities: Hackers can target software weaknesses (such as bugs or security flaws) to gain access to a system. They may deploy malware or use techniques like buffer overflows to exploit these vulnerabilities.

2. Phishing attacks: Hackers often use phishing emails or fake websites to trick users into providing sensitive information like login credentials. Once hackers obtain this information, they can use it to access the system.

3. Social engineering: Hackers may use social engineering techniques to manipulate people into providing access to a system. This....

Q/A
How does the advancement of information technology impact legal regulations and compliance in the digital age?
Words: 551

Impact of Information Technology on Legal Regulations and Compliance in the Digital Age

The rapid advancement of information technology (IT) has profoundly reshaped various aspects of modern society, including the legal landscape. In the digital age, IT has created novel challenges and opportunities for legal regulations and compliance.

Challenges to Legal Regulations

Data Privacy and Protection: IT has led to the proliferation of personal data collection and storage. This raises concerns about data privacy and the potential for misuse, unauthorized access, and data breaches. Legal frameworks must address these issues to safeguard individuals' rights.
Intellectual Property Rights: Digital technologies make it easier....

Q/A
How do self-driving cars navigate complicated roadways and intersections?
Words: 367

Self-driving cars use a combination of sensors, cameras, lidar (laser-based radar), GPS, and mapping technology to navigate through complicated roadways and intersections. These sensors and cameras constantly gather information about the car's surroundings, such as the positions of other vehicles, pedestrians, road signs, traffic lights, and lane markings.

The data collected by these sensors is then processed by a complex computer system that makes decisions in real-time about how to navigate through the environment. This system uses algorithms and artificial intelligence to interpret the sensor data, plan the car's route, and make decisions about when to accelerate, decelerate, change lanes, and....

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now