StudentShare solutions
Triangle menu

Computer Use - Assignment Example

Nobody downloaded yet

Extract of sample
Computer Use

The accounts were kept and maintained manually.
As there was no properly trained person the computer remained idle for about six months. The things started to change when one day the Managing Director of the company visited the branch office. Seeing the computer idle he got furious and more of when he realized that there was nobody who could operate the computer and more so that he had no knowledge of this fact. He immediately decided to train the staff in computers.
The staff was trained in computer basics, computer accounting and the software used by the company for its day-to-day working. This is how the use of the computer began. The starting phase was not easy. Once the motherboard failed, it took about 10 days to get repaired. Then once the hard disk also failed. The staff found that instead of helping, the computer is proving to actually hinder their work. The demand of energy on them increased for they not only had to perform the routine works but also have to be concerned about the repairing and the maintenance of the computer.
Obviously the staff wanted the computer to be removed. However the Managing director persisted with the use of the computers. He requested his the head office Hardware Engineer to take the additional responsibility of the single computer at the Cambridge branch. He happily agreed without asking for extra remuneration for according to him a computer was a toy. He checked the whole system, reinstalled Windows 98 operating system and the other softwares of regular use. He installed antivirus also, and thereafter kept on checking the system regularly. The computer then started working smoothly without any problems.
Thereafter the work of the branch went on increasing. The accounting work was totally computerized and company's main tailor-made software was also operational. Later two more employees were added.
About two years ago a dealer of Dell Computers launched the buy back scheme for the computers. Cambridge's old computer was quite outdated so the Branch Manager decided to purchase the new one in exchange of the old. Meanwhile the director of the company had decided to fully computerize all the branches and connect them via intranet. The Branch Manager found that he would be requiring in all three computers.
Thus two years ago three computers were purchased all of the Dell Company, this was as per the contract of the company with Dell. The Dealer Pegasus Infosystems gave the free services for one year. Thereafter the company made an annual maintenance contract with the same dealer.
2. Details of Computers:
2.1 Hardware: As mentioned earlier the company has three computers of Dell make. Here are the detailed configurations of the computers:
1) Dell make Pentium IV: Intel PIV processor 2.0GHz, 40 GB Hard Disk (2 numbers), 15" Color Monitor, 845 Mother board, DVD Combo, Tower Cabinet, ...Show more


1. Introduction of Company's Computers: The company has been using the computers since about eight years. Initially about eight years ago the branch office purchased its first computer. However the staff was not trained in computers so it remained in the box for about 15 days…
Author : devanklocko
Computer Use essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Computer Use"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party
The advantage of using the electronic media has spun new criminal activities that include persuasive use of computer abuse and fraud. It has become challenging for the local and federal government to investigate and prevent crimes and offenses caused by the computer abuse as it has resulted in many social and financial losses over the years.
10 pages (2500 words) Assignment
Computer Architecture
The reason for this is that almost every electronic computer that has ever been developed has been based on this architecture (Aspray, 1990). The von Neumann architecture is named after John von Neumann, a pioneering mathematician and scholar who first published a paper putting forth what was required from any electronic computer meant for general use.
4 pages (1000 words) Assignment
Use of Computer based Technology in Engineering Design
In so doing modern design tools have been computerised because they make it easier to design edit and incorporate with simulation tools. Computer-aided-design no doubt cuts down on cost, complexity and time requirements for any project.
4 pages (1000 words) Assignment
Cash Computer Supplies
John, Newfoundland; however, the business was confronted with difficult issues based from the phone-survey gathered by Mr. Whiteway. The phone survey, eventually, suggested that the target market prefers buying from a company that has a physical store even though the price of the item is a little expensive.
4 pages (1000 words) Assignment
Human Computer Interaction Privacy Issues
As a subfield of Computer Science, Human-Computer Interaction (HCI) studies how people interact via computational technologies. Thus, privacy is a key issue of the user experience with computers, new technologies and online systems. It is essential to know what to consider regarding users and their views regarding computer systems.
12 pages (3000 words) Assignment
Computer security proposal report
Without a doubt, business organizations that heavily rely on networks and computer systems to carry out on a daily basis business operations and transactions as well as access vital information with regard to their data as a significant element of
2 pages (500 words) Assignment
Human computer interaction
This paper will delve into the effectiveness of Human Computer Interactions by evaluating how online community members of the Auckland Movie Fans Meetup Group engage. Auckland Movie Fans Meetup Group has attained several
1 pages (250 words) Assignment
Information Systems Use Security Policy
For example, service delivery advancements, creation of new business models and using just-in-time inventory would not be possible if it were not for the use of information systems. However, using the information systems in a growing
3 pages (750 words) Assignment
History of Crime and Computer Crime. Traditional Problems. Recognizing and Defining Computer Crimes/ Contemporary Crimes/ Categorizing Computer Crime
Primarily, cybercrime does utilize the computer as to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft. Another type of
6 pages (1500 words) Assignment
Computer Security
Kerberos uses the KDC for authentication. The user logs in, and the principal sent to KDC server for login. The KDC server, in return, provides Ticket-Granting Tickets (TGT). The KDC server
1 pages (250 words) Assignment
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment