Computer program

Sort By:
Page 7 of 50 - About 500 essays
  • Decent Essays

    Supervisor Reflection

    • 491 Words
    • 2 Pages

    Shortly after becoming a supervisor I noticed we had 35 laptop computers that were not using due to our forms were all in paper format. I volunteered to make a current paper forms into electronic forms. I had never done anything like this before, so it was an incredible challenge as a new supervisor to take on this type of a project, but I felt it would be worthwhile. I proceeded meticulously through each form ( 32 forms in all) for almost six months collaborating with several other supervisors

    • 491 Words
    • 2 Pages
    Decent Essays
  • Good Essays

    INTRODUCTION The project entitles “BrainARC” is a Game Application that can be played by any person. This Game Application will be catchy for all the age groups above seven years. Objective of this application is to automate the unadventurous gaming process. It helps in finding solutions to the manual unadventurous gaming process. The application analyses the problem of dealing with the great deal of manual work. It will be handling the situations related to human brain and to ease up the user’s

    • 3909 Words
    • 16 Pages
    Good Essays
  • Better Essays

    my homework; if I could write a computer program where a ball bounced across the screen, he would subtract one hour of detention off my time for every trick the ball did. This seemed like something I could not refuse. To my disbelief, I spent more time studying and learning GW-BASIC and then developing my program, than I ever spent on any subject in the past. Nonetheless, I stuck with the agreement. By the end of the semester, not only did I write my first program; somehow, I managed to become

    • 1884 Words
    • 8 Pages
    Better Essays
  • Good Essays

    MALWARE ANALYSIS/DETECTION TECHNIQUES Sikorski & Honig (2012), explain the fact that when carrying out malware analysis and detection, only the malware executable is present, which is usually not in natural language form. A variety of tools and techniques need to be employed to ensure that the underlying information is revealed. Two basic approaches to malware analysis and detection include: static analysis (observing the malware without running it), and dynamic analysis (running the malware). They

    • 1552 Words
    • 7 Pages
    Good Essays
  • Decent Essays

    For my Hour of Code assignment, I chose to do “Write your first program (Angry Birds).” I ended up choosing this activity over the other two because I’ve played Angry Birds before and I thought it would be interesting to see how that type of game was coded. I realize that this exercise was supposed to be extremely easy and fun, but I felt like it was so easy that it lost its intrigue. They probably could have come up with a few more loopholes that would make it a little more thought provoking

    • 301 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Please accept this letter as application for your Reentry Case Manager position as advertised on ConnectVA. I believe my pervious internship experience at OAR of Richmond along with my current role as a Correctional Officer will make me great applicant to your join your team of driven staff at OAR of Richmond. OAR of Richmond is an organization I hold dear to my heart; not only was it the organization whom introduced me to the nonprofit sector but it also became the focus of my capstone for my

    • 303 Words
    • 2 Pages
    Decent Essays
  • Better Essays

    Ensuring trust in the data once the system is up and running which is smart to assign a time frame to remain on hand for any situations of data analytics that could cause a situation. The eCommerce system should require use of controls for the computer-based information system which are vital for an uneventful and productive functioning of the new system. The two categories of controls are utilized to make certain, adaptability among the dissimilar interconnected departments, which are known as

    • 1297 Words
    • 6 Pages
    Better Essays
  • Good Essays

    this controls are and how this controls are used, as well as learn about other risks that business face and their respective categories. 1. General Controls General Controls consist of implementation controls, software controls, hardware controls, computer operations controls, data security controls and administrative controls. These controls ensure that authorized user involvement as well as specific procedures and standards are followed, controlled and are properly managed to secure physical and

    • 1104 Words
    • 5 Pages
    Good Essays
  • Decent Essays

    evaluate their programs? It is crucial that Human Service agencies evaluate their programs to ensure that they are providing effective services to their consumers. Program evaluation allows an agency to see what they are doing well and what needs improvement. Through collecting hard data on important outcomes, agencies can make program decisions based on facts rather than opinions. These outcomes can be tracked over time to see important trends and potentially make changes to programs to address the

    • 849 Words
    • 4 Pages
    Decent Essays
  • Better Essays

    Source Code Essay

    • 1154 Words
    • 5 Pages

    that most people acknowledge is “the version of software as it is originally written by a human in plain text” (Source Code). According to this definition, code is written by humans in order to create software, which can be any operating system, program or data with a processor. The average person can see that the source code would be the code that the software needs in order to function. This is source code but source code is also much more. Another definition states holds that source code is

    • 1154 Words
    • 5 Pages
    Better Essays