As there was no properly trained person the computer remained idle for about six months. The things started to change when one day the Managing Director of the company visited the branch office. Seeing the computer idle he got furious and more of when he realized that there was nobody who could operate the computer and more so that he had no knowledge of this fact. He immediately decided to train the staff in computers.
The staff was trained in computer basics, computer accounting and the software used by the company for its day-to-day working. This is how the use of the computer began. The starting phase was not easy. Once the motherboard failed, it took about 10 days to get repaired. Then once the hard disk also failed. The staff found that instead of helping, the computer is proving to actually hinder their work. The demand of energy on them increased for they not only had to perform the routine works but also have to be concerned about the repairing and the maintenance of the computer.
Obviously the staff wanted the computer to be removed. However the Managing director persisted with the use of the computers. He requested his the head office Hardware Engineer to take the additional responsibility of the single computer at the Cambridge branch. He happily agreed without asking for extra remuneration for according to him a computer was a toy. He checked the whole system, reinstalled Windows 98 operating system and the other softwares of regular use. He installed antivirus also, and thereafter kept on checking the system regularly. The computer then started working smoothly without any problems.
About two years ago a dealer of Dell Computers launched the buy back scheme for the computers. Cambridge’s old computer was quite outdated so the Branch Manager decided to purchase the new one in exchange of the old. Meanwhile the director of the company had decided to fully computerize all the branches and connect them via intranet.
Cite this document
(“Investigation of computer use Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/316457-investigation-of-computer-use
(Investigation of Computer Use Essay Example | Topics and Well Written Essays - 2500 Words)
“Investigation of Computer Use Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.net/miscellaneous/316457-investigation-of-computer-use.
Cited: 0 times
Introduction of Company’s Computers: The company has been using the computers since about eight years. Initially about eight years ago the branch office purchased its first computer. However the staff was not trained in computers so it remained in the box for about 15 days…
On the basis of the literatures critically reviewed, the researcher believed that branding has helped growth of tablet PC market in the UK. To test this hypothesis, the researcher employed quantitative survey method using 60 respondents, and semi-structured interview method for the qualitative study.
This paper focuses on creating a manual that helps the forensic examiners in the lab to avoid committing any mistake while they are dealing with the digital evidence. The process that the examiner should follow: check the investigator needs, document everything about the case, fill chain of the custody, resize the evidence, and store it; make verification for the lab tools and software has to check that it works properly and clearly outlined.
Computer is an electronic device which is used to calculate, to solve various problems, and to give useful information in the form of an output. Additionally, a computer has the capability to get instructions which are frequently recognized like programs in the phrasing of computers, and then it does calculations, that differentiate a computer from a motorized calculating machine.
The author states that computer forensics can be defined in many ways. Though, normally, computer forensics is recognized as a method utilized for the analytical analysis and investigative methods to identify, gather, inspect and preserve information and evidence which is magnetically encoded or stored.
Investigations are normally carried out with the objective of determining what caused the incident or accident to happen. Forensic refers to the process of using science and technology in carrying out investigations and establishing facts about a case filed in a court of law.
The application and potential use of Benford’s law in detecting fraud, particularly in accounting and audit situations, is gaining popularity in the recent years. The law is based on a simple observation that lowers digits appear more frequently than others in certain data sets.
uit Television (CCTV) is a part of such technologies used for scrutinising the premises of vital installations such as airports, railway stations, street corners, parking lots, shops and other sensitive premises. The use of CCTV is “one of the most common forms of video
12 pages (3000 words)Essay
Got a tricky question? Receive an answer from students like you!Try us!
Let us find you another Essay on topic Investigation of computer use for FREE!