Monster Essays - Thousands of essays
Enter Essay Topic:   
 

Computer Ergonomics In The Work Place

.... 1993) In the average computer workstation, employees are prone to over a dozen hazards. There exist two factors that can prevent this: forming good work habits and ergonomically designed computer workstations. We will discuss these preventions throughout the paper. First, a few terms may need defining. Repetitive Strain Injuries (RSI) takes place from the repeated physical movements of certain body parts which results in damage to tendons, nerves, muscles, and other soft body tissues. If these injuries are not taken care of immediately, permanent damage could be done. A few common results of RSI's that were not taken care o .....

[ Download This Essay Now ] Number of words: 3251 | Number of pages: 12

Computer Aided Drafting And Design

.... systems are drawn with the aid of a keyboard, mouse, or tracking ball. One selects the starting point of a line, the ending point, and the line is drawn. A scale at the bottom of the screen tells how long the line will be. On some CADD systems, the computer itself can measure how long the line will be while the operator inputs the length of the line. Lines are the basis of all drawings. Straight lines are fairly simple and quick to make, but what about curved or wavy lines? That's what different CADD commands are made for. Different CADD commands make different things on the screen possible. There are commands for dimen .....

[ Download This Essay Now ] Number of words: 799 | Number of pages: 3

Bulletproof Vests

.... The function of ceramic armor is to slow the bullet abruptly by the hardness of the ceramic and to dissipate the bullet's energy as it destroys the armor at the point of impact; the tiles or plates of ceramic bulletproof vest thus have to be replaced once they have stopped a bullet. The textile vest deforms the bullet and then dissipates its energy, entangling it in the vest's many layers. A textile bulletproof vest is fashioned of sixteen to twenty-four layers of nylon cloth of a heavy weave, the layers stitched together like quilt. Any ordinary pistol or sub-machine gun bullet striking the garment is immediately fla .....

[ Download This Essay Now ] Number of words: 376 | Number of pages: 2

Computer Crimes

.... Too by left is a drawing that illustrates the method that most Hackers use to take over your computer. Ever since the dial-up connection was invented anyone with a modem had the ability to wreck any one of thousands of computers. One of the most talked about forms of computer crime is computer viruses. A computer virus is a small but highly destructive program written by an unscrupulous computer Hacker. Back in 1984 a 17 year old computer Hacker single handedly brought down four hundred thousand computers in a matter of hours. Too my left is a graph depicting the # of computer crimes comited from 1988 till now. Some Ha .....

[ Download This Essay Now ] Number of words: 666 | Number of pages: 3

Requirements Needed In Certain Computer Related Fields

.... leadership skills an asset. The salary of a project leader varies occasionally, but in this case it is an important position, earning $60 000 - 70 000 annually. Systems Administrator Systems Administrator is responsible for administering overall system needs in a business (in this case, the College). Some requirements include: - A degree in computer science or technical college diploma in a related discipline. - 2 years or more experience in database design. - Two years experience in a Novell / DOS environment. - Knowledge of overall PC hardware The job offers a very c .....

[ Download This Essay Now ] Number of words: 903 | Number of pages: 4

Computer Crime

.... is purely intellectual. I know one reason is that is can be very rewarding. Hackers are drawn to computers for the aninymity they allow. They feel powerful and can do anything. Hackers can be there own person out side the real world. I found out Arizona was the first state to pass a law against computer crime, in 1979. In 1980 the U.S. copyright act was amended to include soft ware. I found out that in 1986 a computer farad abuse act was passed. This act was made to cover over any crime or computer scheme that was missed with any former laws. Violations to any of thesis laws are a maxim of five years in prison and a $250,00 .....

[ Download This Essay Now ] Number of words: 474 | Number of pages: 2

The Involvement Of Computers In Future Jobs

.... And now it has paid off. I now have a business of my own, working as a computer consultant. I assist others in learning about computers to be able to operate more efficently in their everyday jobs. Computers will fall into careers and our everyday life more rapidly then you think. Perhaps you would like to be a teacher. You will store all class data, students work, names, grades, records all accessible by computer. Or, how about a doctor. You will use computers to examine and evaluate a patients problem quicker and more efficiently. These are only a few examples. The bottom line is, computers provide worthwhile caree .....

[ Download This Essay Now ] Number of words: 1338 | Number of pages: 5

Victims In Progress Of Technology

.... decades, are resources are limited and must be conserved properly. Tribal societies are a shining example of how to manage these resources, because they only use and eat what they need without wasting valuable resources. To demonstrate let us examine Bodley's study of the Maori tribe. The Maori tribe, settled in New Zealand during the age of expansion, allowed and even aided settlers in colonizing on the island. As the number of white settlers grew, they began to seek and take more and more land from the Maori tribe. When the Maori tribe began to resist, the colonizing governments rationalized that they were interfering with .....

[ Download This Essay Now ] Number of words: 314 | Number of pages: 2

Coping With Computers

.... experiences with a computer involved sending a message over the AP news wire. As it turns out, she expressed her candid opinion on some very sensitive topics at the time, including but not limited to the Vietnam War. Consequently, the AP was not amused with the message and she was fired. At the time, this incident was popular enough to make it into Newsweek magazine. Later on, she moved into television as a reporter, but now owns her own production company, Lucky Duck Productions. Here, she realized that computers act as the driving force in a technologically based industry. She also realized that the younger generations are .....

[ Download This Essay Now ] Number of words: 503 | Number of pages: 2

Computers In Math

.... by x and store x4 5.Multiply x by 6 and store 6x 6.Multiply stored x2 by 5 and store 5x2 7.Multiply stored x3 by 4 and store 4x3 8.Multiply stored x4 by 6 and store 6x4 9.Add 6x4 10.Add 4x3 11.Subtract 5x3 12.Add 6x 13.Add 4 Binary Coded Decimal One of the most convenient conversions of decimal to binary coded decimal's is used today in present day computer's. BCD(Binary Coded Decimal) is a combination of binary and decimal; that is each separate decimal digit is represented in binary form. For example the chart below represents the Binary and Decimal conver .....

[ Download This Essay Now ] Number of words: 1112 | Number of pages: 5

OpenVMS: Using A Virtual Operating System By The International Securities Exchange

.... on Digital's VAX and Alpha computer systems. Digital Equipment Corporation owned the operating system. It wasn't until January 25, 1998 Compaq computers acquired Digital Equipment at a tremendous price of 9.6 billion dollars. "This is a marriage made in heaven," says Sateesh Lele, CIO at the European division of General Motors, which uses products form both companies. "Digital has all the services, and Compaq is a great powerhouse manufacturer." It is indeed a perfect match, with the combination of these two companies, how will the competition stack up to the other computer manufacturers? This deal seems more of a threat .....

[ Download This Essay Now ] Number of words: 963 | Number of pages: 4

CyberPorn: On A Screen Near You

.... children face everyday. The Exxon bill proposed to outlaw obscene material and impose fines uo to $100,000and prison term up to two years on anyone who knowinglymakes "indecent" material available to children under the age of 18. Robert Thomas spends his days like any other inmate at the U.S. Medicalcenter for Federal prisoners in Springfield. Thomas, 39 a amateur BBS in California, made headlines last year when he and his wife were indicted for transmitting pornographic material to a government agent in Tennessee. This case shows how tight of a squeeze the govenment is putting on internet Freedom. .....

[ Download This Essay Now ] Number of words: 308 | Number of pages: 2

« prev  17  18  19  20  21  next »

 Copyright © 2003 Monster Essays.com
 All rights reserved