university in Cairo Computer Science & Engineering Department CSCE 106 - Fundamentals of Computer science Course Layout – Spring 2013 http://www.cse.aucegypt.edu/~csci106k/ Course: Instructor: Office: Office hours: Lab Instructor: CSCE 106-03&05 “Fundamentals of Computer Science” ‚ 3 Credit Hours Dr. KHALIL E-Mail: akhalil@aucegypt.edu Room 2148 SSE 1:00 - 2:00 pm UTW Alia Saad E-mail: alisaad@aucegypt.edu Course Description Introduction to the discipline of computing. Computer history and Evolution
Premium Computer Programming language Algorithm
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession‚ some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Computer hacking is most common among teenagers and young adults‚ although there
Premium Hacker
Computer forensics‚ also called digital forensics‚ network forensics‚ or cyberforensics‚ is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity‚ the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media‚ programs‚ data‚ and log files on computers‚ servers‚ and networks. Many areas
Premium Law Computer security Forensic science
LexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexiLexi
Premium Computer Computer data storage Central processing unit
Computers in accounting Uses and advantages and disadvantages of computers in accounting Traditionally accounts were kept by the means of handwritten record. Computers have only begun to be used in some of the functions of accounting over the last fifteen years or so. As computers became cheaper‚ easier to use‚ and more powerful‚ more firms have decided to computerise their own accounting records. However‚ some firms‚ (albeit a declining number) still prefer to use handwritten accountings. This
Premium Accounting software Application software Computer
From the time computer games made their way into family homes‚ parents have wondered if violent video games may negatively affect children and teenagers. Today‚ parents still worry about the effects of violent computer games and of course it also remains a popular topic for the media. However‚ with a growing number of children and teens spending excessive time playing computer games‚ perhaps parents should be more worried about teenagers addicted to computer games than the effects of violent video
Free Video game
Effect of computer addiction Computer addiction‚ our world is surrounded by technology and we use technology to almost everything‚ our world has gotten so used to tehcnology around us we cannot imagine a life with it‚ though it can come handy it still has its negative effects. Computer addiction is common nowadays beacuse we cant imagine living a life without technology‚ we use computers for almost everything.Parants usually buy their kids computer to study but teenagers often find a
Premium Time Addiction Computer
INTRODUCTION Welcome to computer programming! You are about to discover an interesting and exciting world – a world of computer programming. In this unit‚ we introduce you to the concepts of basic computer programming . You will study the terms and concepts used in computer programming. We will then describe the five steps in computer programming. 2.0 OBJECTIVES At the end of this unit‚ you should be able to: 1. Understand the programming process 2. Define computer programming‚ program
Free Programming language Computer program Computer programming
The Journey Inside Introduction to Computers Lesson 2: Four Components of a Computer Directions: Use the http://educate.intel.com/en/TheJourneyInside/ExploreTheCurriculum/ website to complete the units in this series. Choose Intro to Computers on the gray menu bar. Choose Lesson 2 on the left side of your screen and complete the questions below after reading the paragraph‚ watching the video‚ and completing Activity 1. 1. Both a toaster and a computer have physical parts you can touch such
Premium Computer data storage Computer Microprocessor
Computer Addiction as a Gendered Phenomenon In the late 1990s‚ a barrage of media reports declared that women were becoming uncontrollably addicted to the Internet and some were neglecting—or even leaving--their husbands and children as a result of their online obsession. Headlines described the strange phenomenon: Internet Blamed for Neglect: Police Say Mother Addicted to Web(Bricking‚ 1997)‚ ‘Net-addicted Mother Loses Custody of Her Children (1997)‚ Mom Web Addict Allegedly Neglected Kids (1997)
Premium Addiction