Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Investigation of computer use - Essay Example

Comments (0) Cite this document
Introduction of Company’s Computers: The company has been using the computers since about eight years. Initially about eight years ago the branch office purchased its first computer. However the staff was not trained in computers so it remained in the box for about 15 days…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Investigation of computer use
Read TextPreview

Extract of sample "Investigation of computer use"

Download file to see previous pages As there was no properly trained person the computer remained idle for about six months. The things started to change when one day the Managing Director of the company visited the branch office. Seeing the computer idle he got furious and more of when he realized that there was nobody who could operate the computer and more so that he had no knowledge of this fact. He immediately decided to train the staff in computers.
The staff was trained in computer basics, computer accounting and the software used by the company for its day-to-day working. This is how the use of the computer began. The starting phase was not easy. Once the motherboard failed, it took about 10 days to get repaired. Then once the hard disk also failed. The staff found that instead of helping, the computer is proving to actually hinder their work. The demand of energy on them increased for they not only had to perform the routine works but also have to be concerned about the repairing and the maintenance of the computer.
Obviously the staff wanted the computer to be removed. However the Managing director persisted with the use of the computers. He requested his the head office Hardware Engineer to take the additional responsibility of the single computer at the Cambridge branch. He happily agreed without asking for extra remuneration for according to him a computer was a toy. He checked the whole system, reinstalled Windows 98 operating system and the other softwares of regular use. He installed antivirus also, and thereafter kept on checking the system regularly. The computer then started working smoothly without any problems.
About two years ago a dealer of Dell Computers launched the buy back scheme for the computers. Cambridge’s old computer was quite outdated so the Branch Manager decided to purchase the new one in exchange of the old. Meanwhile the director of the company had decided to fully computerize all the branches and connect them via intranet. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Investigation of computer use Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from
(Investigation of Computer Use Essay Example | Topics and Well Written Essays - 2500 Words)
“Investigation of Computer Use Essay Example | Topics and Well Written Essays - 2500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Investigation of computer use

Human Resource Manager's Use of Computer Tools

This essay discusses that human resources managers utilize a number of technological tools on a daily basis to carry out their jobs. At the core of those technological tools is the personal computer, which adds in to the good organization of the human resources experts by letting them to make use of electronic recording systems. “Software used by HR managers includes word processing programs, spreadsheets such as Microsoft Excel and Lotus 1-2-3, accounting software like Intuit QuickBooks, AccountantsWorld Payroll Relief and Sage Software Peachtree, and various types of HR software. Human resource-specific software includes programs such as Sage Software Abra HRMS, WhizLabs Software and UniFocus Watson Human Resources Manager softw...
22 Pages(5500 words)Research Paper

Computer Use and Copyright Policies and Regulations

...?Running head: IMPORTANCE OF COMPUTER USAGE AND COPYRIGHT POLICIES Importance of Computer Usage and Copyright Policies Introduction The usage of computers and internet has become an integral part of our day to day lives. One cannot imagine the world without these advanced technological boons to our society. The use of these gadgets and increased dependency on them has also ushered in the good and the bad. Technology has been used not only for the good of the society, but has been used to harm and disrupt the society through many acts of violence and terror. That necessitated the implementation of corrective and pre-emptive measures to restrict and regulate the usage of computers and internet. Every single organization, educational...
6 Pages(1500 words)Research Paper

Use of Technology in Forensic Accounting Investigation

... by technology in carrying forensic investigation involves improving the criminal investigation process so as to ease the work of the police of tracking all types of persons who may be violating the law. The businessmen as well as the police benefit from using information technology because enables them carry out their businesses in the right way and also trap criminals who are a threat to their lives and businesses (Kanellis, 2006:20). The criminal records and suspect information are normally computerized therefore any investigator in any part of a country can access information that is relevant to conduct an investigation concerning any suspected criminal. Computer files are searched according to the investigators desires since relevant...
10 Pages(2500 words)Essay

Use Of Benford's Law In Fraud Investigation

it is surmised that when used appropriately and prudently, Benford’s Law presents itself as useful tool in investigating fraud, particularly in relation to accounting and auditing situations. The mathematical validation of the law and the technological advances in the recent past, which facilitate faster and easier programs for digital analysis, have enhanced the usefulness of the law in detecting fraud, as the law is increasing used by forensic accountants and auditors. The cases discussed in the course of the paper demonstrate the usefulness of the law in detecting fraud in real life situations. However, it is important to note that the detection and establishment of fraud in the legal sense of the term calls for further analysi...
20 Pages(5000 words)Essay

Use of informants in criminal investigation

...The Use Running head: USE OF INFORMANTS IN INVESTIGATION The Use of Informants for Investigative Purposes in Criminal Investigation YOUR full name Date submitted Email Address Criminal Investigation SPR, 2009 The Use 2 The Use of Informants for Investigative Purposes in Criminal Investigation In an investigation of a crime, information is the fuel that propels the case forward to its conclusion. A definition of informant, when used by law enforcement officials as quoted from Black’s Law Dictionary by Fitzgerald, is “A person who informs or prefers a an accusation, whom he suspects of the violation of some penal statute” (Fitzgerald, 2007 pp. 1). The term informant does not generally refer to a witness to a crime or to someone...
5 Pages(1250 words)Essay

The Use of Computer to Ones Advantage

...Full The Use of Computer to One’s Advantage Modern technology has made a lot of jobs easier nowadays. Machines are now used to carry heavy burdens enabling fast constructions of buildings, roads, bridges and the like. These machines improved with the use of computers to manipulate them. The effects of modern technology are not just limited in such burdensome works but have affected travel and communication as well. Transportation has greatly improved from the carts pulled by horses to the manual cars, buses and trains and now, the computer-operated vehicles. This improvement brought ease and comfort in everyday travels that the world has literally become smaller. Another extent that computers have affected is the communication process...
4 Pages(1000 words)Essay

The Widespread Use of Information Communication Technology

An increasing number of frauds is an example of an alarming situation. All these have a far-reaching impact on the employees, on businesses and on people. 

On the work front, the advantages of ICT cannot be overlooked in maintaining and implementing successful quality programs. Customer-driven standards, customer-supplier links, the prevention of error, quality at the source, and continuous improvement are some of the principles that are put into practice (Laudon & Laudon, 2000 cited by Iles & Healy, 2004). IC T facilitates the production process, helps meet benchmarking standards, make constant upgradation based on customer demands. The internet has revolutionized not just the selling of goods and services...
9 Pages(2250 words)Essay

Aircraft Maintenance Technology in Today Use

Aircraft Maintenance technology relates to the actions required to improve the airworthiness and the designed-in reliability of an aircraft and its systems, subsystems, and components throughout the life cycle of the aircraft. Aircraft Maintenance Technicians (AMTs) perform or supervise maintenance, preventive maintenance, and alteration of aircraft and aircraft systems in accordance with the provisions of Federal Aviation Regulations.

As the aviation technology made it progress, it was necessary to bring in the maintenance of all the aircraft for it’s prolonged and safety use. From the time it started, aircraft maintenance has gone through a series of changes. From basic to improvised and now the high-tech mainte...
7 Pages(1750 words)Report

Use of Batteries as Power Sources

Plus key issues exacting to a low-side Li-ion protector circuit are converse. The transients shaped when the Li-ion protector opens throughout a brief short or when the battery is unplugged even as beneath load may exceed the voltage rating of semiconductors in the battery set. This theme describes a number of plan issues and suggests solutions to make your mind up or get better them. The resolution of these subjects requires attention to together the circuit design and the printed circuit board (PCB) explains.

If we analyzed the Fig. 1 then we come to know that it is a block drawing of circuitry in a typical Li-ion battery set. It demonstrates an instance of a security protection circuit for the Li-ion cells and a gas...
10 Pages(2500 words)Report

The Increasing Use of Outsourcing by Large International Organisation

It should be kept in mind here that this is a symbiotic relationship, benefiting both the parties on a consistent basis. It has also been seen that the developed nations are more than happy to outsource their work and set up offshore avenues in order to earn revenues and make the most out of their business. However, the litigations that are in place with regards to setting up these industries are something that needs to be delved into by them in detail and we, as students of the same, will try our best at understanding the whole ball game. (Domberger, 1998)

Global sourcing is a phenomenon that is on the rise with the passage of time. It is also known as ‘outsourcing’ as it looks to cover the weak areas of a...
10 Pages(2500 words)Term Paper

Quality Use of Medicines - Pharmacy Comparison

The pharmacist is also the justice of the peace.

Comparing this pharmacy with the Campbell pharmacy, the Chandler pharmacy is located in a much busier area, hence there are more shops and more people in the vicinity. There are more medically related establishments in the Chandler pharmacy than in the Campbell pharmacy, hence there are more patients buying their medicines in the Chandler pharmacy. Both pharmacies have similar conveniences for their customers. They are located near a bus stop and taxi ranks, and a car park is available within the vicinity of both pharmacies.

The Chandler Kamart pharmacy is a very busy pharmacy with three full-time pharmacists and 8 pharmacy assistants working in one shift. With...
9 Pages(2250 words)Essay

Narrative Voice, Characterization, and Use of Settings in Catcher in the Rye and a Short History of Tractors in Ukrainian

The same is true of any writer. One is trying to get into a unique writing style, often without deliberate inclinations-- the style emerges of its own, -- but sometimes, the narrative voice as a writing technique is consciously employed by the writer. To start with, it is necessary for the writer to select which POV (point of view) to use.

The author’s persona of a fictional narrative can contribute to or mar the success of the story. Much depends on the plot of the story and how the author wishes to develop it. What is the emotional content of the story as a whole and how the individual emotional levels contribute to the total success of the story? There should not be any artificiality about the development of th...
8 Pages(2000 words)Assignment

Investigation of the Transient Behaviour of Earthing Systems Subjected to High Impulse Currents

The effect of the transient voltages and currents on the earthing systems has a great influence on the performance and evaluation of the substation equipment against lightning overvoltage. While the characteristics of the earthing system under steady-state depends on the electrode design and soil prosperities alone, the characteristics of the earthing system under impulse currents depends on the magnitude and shape of the impulse current. The experimental setup for the impulse tests on earthing systems has been designed with an impulse generator, voltage and current transducers and different types of earthing systems. The impulse tests with impulse voltages ranging from 500 V to 4 kV have been carried out and the impulse resistanc...
136 Pages(34000 words)Dissertation

Computer Privacy Issue

The requirement has increased because there are unscrupulous computer attacks and private details are being stolen now more and more. These malicious data attacks have left the computers worldwide at a risk and hence the need to have privacy is of fundamental significance. If these privacy regimes are not taken care of, one could guarantee that problems would come about quickly and the computer networks would crash down instantly, thus providing fatal for the businesses and individuals alike. It goes to show without any doubt that privacy forms up as the most essential ingredient of success within a business entity and any organization would absolutely cherish the idea of having privacy within their networks to keep away the negat...
6 Pages(1500 words)Essay

Independent Expert Witness Use of Computer Forensic

...Independent Expert Witness’s Use of Computer Forensic Computer forensics is the preservation, identification, extraction, interpretation, and documentation of computer evidence including legal processes, integrity of evidence, factual reporting of the information found, and ability to provide expert opinion in a court of law or other legal proceeding as to what was found. A computer forensics investigator is trained in combating crimes ranging from crimes against children to file system recovery on computers that have been damaged or hacked. The computer forensics investigator, also known as a computer forensics specialist, recovers data from digital media that will be used in criminal prosecution. Special care must be taken to ensure...
10 Pages(2500 words)Coursework

The Use of Rhetoric in the Electronic Age

The rubric of the rhetorical theory is an extremely contested discipline with classical rhetoric theory focusing on the concept of rhetoric as a form of persuasion or an ideological perspective that asserts “rhetoric’s role in upholding power and domination” over the “general public” as the underlying basis of societal communication (Stacks & Salwen, 2008, p.240). However, the boundaries of the classical rhetorical theory have been challenged by cultural change, context and the permeation of alternative perspectives. 

In particular, the impact of the digital revolution and the growth of numerous multimedia streams on cultural norms has challenged classical theory propounding the fu...
14 Pages(3500 words)Article

The Increasing Use of Technology

Technology has no doubt had an incredible impact on our lives in many ways, such as through making information and other things more accessible, facilitating all kinds of tasks including communication, making life easier and more enjoyable, but these developments have come at the expense of reducing our involvement, making people unable to cope with situations when the technology breaks down, and so on. It is argued that situations of over-reliance and dependency do exist, so technology has indeed taken over and that people should, therefore, use technology effectively so they can derive its benefits but also cautiously so that it does not cause any detrimental effects in a situation where they are avoidable.

10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Investigation of computer use for FREE!

Contact Us