Computer Programming Essay

This essay has a total of 1610 words and 10 pages.

Computer Programming















Computer Programmer







Matt Katz
Writing for the Real World
Pelkey
November 30, 1999

Computer Systems Analyst

I push the button, I hear a noise, and the screen comes alive. My computer loads up and
starts to process. I see the start screen for Windows 95, and I type in my password. Even
though this takes time, I know that I will be able to do whatever I want to do without any
trouble, without any glitches, without any questions. My computer is now easier to use and
more user friendly because computer systems analysts have worked out the problems that
many computer systems still have.


It appears to me that a career choice needs to contain a number of different features:
One, Will this area of interest mentally stimulate me as well as challenge me; Two, Is
there a way of making a living in these areas of interest; Three, Do I enjoy the different
activities within this area of interest? From the first day that I started my first
computer, I have grasped the concepts quickly and with ease, but the computer as well as
I, will never stop growing. I have introduced myself to all topics of word processing to
surfing the web. After reviewing a number of resources, I have noticed a relatively high
demand for technologically integrated hardware and software positions available with
companies that wish to compete with the demand for “networking”. (“Computer Scientists”
95) This leads me to believe that future

employment prospects will be high and of high quality pay within the next eight to ten
years. The past, present, and future have and will see the computer. Since I have seen the
computer, I have enjoyed the challenges and countless opportunities to gain in life from
this machine. From school projects to games; from the Internet to programming languages; I
have and always will feel like that little kid in the candy store.


A Computer Systems Analyst decides how data are collected, prepared for computers,
processed, stored, and made available for users. (“Computer Systems” COIN 1) The main
achievement as a systems analyst is to improve the efficiency or create a whole new
computer system that proves to be more efficient for a contracting company. When on an
assignment, the analyst must meet a deadline. While striving for a deadline, he must
create and comprehend

many sources of information for the presentation. He must review the systems capabilities,
workflow, and scheduling limitations (“Systems Analyst” 44), to determine if certain parts
of the system must be modified for a new program. First, a computer programmer writes a
program that he thinks will be beneficial for a certain system. He incorporates all of
what he thinks is

necessary. But the hard part is when the programmer runs the program. 99% of the time the
program will not work, thus not creating a profit for the company. Then the analyst looks
at the program. It is now his job to get rid of all of the glitches that are present. He
must go over every strand of the program until the program is perfect.


When the analyst is finished “chopping up” the program, he must then follow a technical
procedure of data collecting, much like that of a science lab. The Dictionary of
Occupational Titles says he must plan and prepare technical reports, memoranda, and
instructional manuals as documentation of program development. (44)


When the presentation day is near, the analyst submits the proof. He must organize and
relate the data to a workflow chart and many diagrams. More often than not, an idea is
always to good to be true unless the proof is there. For this new program that will go
into the system, detailed operations must be laid out for the presentation. Yet, when the
system hits the market, the program must be as simple as possible. A computer systems
analyst must always look for the

most minute points whenever a program is be reviewed.

Education and Training Many people think that this is the type of a job where you must
really like the concept. This is true. Many people think that you need a great prior
experience to ever make it somewhere. This is true. Many people think that you need a
Bachelors degree to at least star out somewhere. This is not true. Through research it a
known fact that you don’t really have to go to college to ever make it. In this particular
field, a college education would be helpful to impress the employer, but for a basic
analyst job, the only proof really needed to go somewhere is the Quality Assurance
Institute. This awards the designation Certified Quality Analyst (CQA) to those who meet
education and experience requirements, pass an exam, and endorse a code of ethics.
(“Computer Scientists” 95) Linda Williams found a technical analyst at the Toledo
Hospital, who went to the Total Technical Institute near Cleveland and earned his CQA. (11
-13)


However, college is the best bet, and a Bachelor is the best reward to have after
achieving the CQA. Employers almost always seek college graduates for analyst positions.
Many however, have some prior experience. Many rookies are found in the small temporary
agencies that need small help. The one who has really made it is in the business for at
least 15 years. When in a secure professional position, an analyst will always need an
upgrading just a quickly as the systems themselves do. Continuous study is necessary to
Continues for 5 more pages >>




  • Computer Programming
    Computer Programming Computer Programmer Matt Katz Writing for the Real World Pelkey November 30, 1999 Computer Systems Analyst I push the button, I hear a noise, and the screen comes alive. My computer loads up and starts to process. I see the start screen for Windows 95, and I type in my password. Even though this takes time, I know that I will be able to do whatever I want to do without any trouble, without any glitches, without any questions. My computer is now easier to use and more user fr
  • Bill Gates1
    Bill Gates1 ENCONIUM OF WILLIAM H. GATES III Nicholas G. Huff English 15 Essay #3 William H. Gates III Bill Gates? When most people hear that name they think of money, power, and computers. These thoughts aren’t necessarily incorrect, but rather insufficient. Sure, Bill Gates has money, thirty-two billion and growing to be exact, and yes he has power, being the CEO of Microsoft as well as the wealthiest man in the country. But people can’t look through their jealousy and envy to see what Mr. Gat
  • Bill Gates1
    Bill Gates1 ENCONIUM OF WILLIAM H. GATES III Nicholas G. Huff English 15 Essay #3 William H. Gates III Bill Gates? When most people hear that name they think of money, power, and computers. These thoughts aren’t necessarily incorrect, but rather insufficient. Sure, Bill Gates has money, thirty-two billion and growing to be exact, and yes he has power, being the CEO of Microsoft as well as the wealthiest man in the country. But people can’t look through their jealousy and envy to see what Mr. Gat
  • Jurrasic Park
    Jurrasic Park Jurassic Park Jurassic Park takes place on an Island off the Coast of Costa Rica which is owned by a multimillionaire, John Hammond. On this island he has set up a genetical engineering facility which permits him and his scientist to create dinosaur from blood extracted from prehistoric mosquitos, that have been preserved in amber. Before he opens this living attraction to the public he needs specialist to approve the park. He brings them to the island and begins to show them what
  • ACTIVITYBASED COSTING BEYOND THE SMOKE AND MIRRORS
    ACTIVITYBASED COSTING BEYOND THE SMOKE AND MIRRORS ACTIVITY-BASED COSTING: BEYOND THE SMOKE AND MIRRORS Summary The business environment in the 1990s is markedly different from that of the past when conventional cost accounting procedures were established. Activity-based costing (ABC), pioneered in the late 1980s, offered a new costing approach consistent with the changed environment. However, ABC did not diffuse rapidly into the business community. This article demonstrates why adopting ABC is
  • Dref
    dref "CREATE YOUR OWN INFORMATION PRODUCTS!" Millions and millions of full sized books and small booklets are sold each year. Most are produced by the large publishing houses. However, there are also several million books sold every year by small, unassuming, one-person publishing companies. Many of these one-person publishers operate from a home-based office. And, surprisingly, some home-based publishers earn excellent incomes. (What\'s more, some are even becoming very rich.) In this report yo
  • FROM BRICK AND MORTAR TO CLICK AND MORTAR
    FROM BRICK AND MORTAR TO CLICK AND MORTAR FROM BRICK AND MORTAR TO CLICK AND MORTAR: MAKING THE TRANSITION FROM CONVENTIONAL BUSINESS TO ELECTRONIC COMMERCE FROM BRICK AND MORTAR TO CLICK AND MORTAR: MAKING THE TRANSITION FROM CONVENTIONAL BUSINESS TO E-COMMERCE TABLE OF CONTENTS Summary 1 Making the Transition from Conventional Business to E-Commerce 4 Introduction 4 Background 4 Problem Definition 5 Hypothesis 6 Methodology 6 Research Design 6 Sources of Data 7 Research Results 7 The Question
  • GenesisYour vision for the Future
    GenesisYour vision for the Future Introduction: “GENESIS” – Your Vision for the Future “GENESIS” Corporation is a company that deals with production of computer software and business applications that are essential for successful conduct of business today. We strive to provide affordable, innovative software solutions to users worldwide by applying creativity, experience and teamwork. The result of our efforts is production of high quality business solutions that make our customers’ live easier
  • Microsoft's Success
    Microsoft\'s Success In 1975 Bill Gates and Paul Allen created a company called Microsoft. A little more than twenty years later, Microsoft is a leader in the field of computer programming. Gates and Allen both had big plans for their fledgling company and came up with different ways of managing people and products in order to create possibly the most effective and versatile workforce of any corporation in existence. To study Microsoft\'s way of doing business is to look at the company from man
  • A System Analyst
    A System Analyst A System Analyst A Systems Analyst analyses, designs and implements the information gathered previously to a system, the final product which is a report of yearly sales, profits, etc. The first thing a Systems Analyst does is to interview the company which wants the report, (called the user) to find out what kind of report they want, format, etc. They must find whether the report is feasible or not, and to find out, they do an analysis of the project. To analyze the project, the
  • Building a computer
    Building a computer BUILDING A COMPUTER With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance. Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate
  • CFortran and others
    CFortran and others Nathan Lindquist Computer Science Section 150-02 Lab Report 7 November 3, 1999 Introduction to the Lab Despite having very little knowledge of the world of computer programming, I have come to believe that C++ is currently the programming language of choice. If that is the case, it would be easiest to only learn C++ and to ignore the other programming languages. However, computer programmers should not ignore the other programming languages for at least three important reason
  • Computer Crime1
    Computer Crime1 Computer Crime Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century--the computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even everychild. The crime itself will often be virtual in nature--sometimes recorded, more often not--occurring only
  • Computer Ethics
    Computer Ethics Computer crime has increased in resent years. The book gives several examples of past computer crimes. Before reading chapter 2 I thought that computer crimes only involved crimes that where associated with hacks. But I learned that a computer crime is a crime that involved a computer in any way. Even if it was just to close a bank account. This chapter gave me a good understanding of what a computer crime is, it also made me think how could I make some money. By reading this cha
  • Computer Graphics
    Computer Graphics Computer Graphics Table of Contents Introduction 3 How It Was 3 How It All Began 4 Times Were Changing 6 Industry\'s First Attempts 7 The Second Wave 10 How the Magic is Made 11 Modeling 12 Animation 13 Rendering 13 Conclusion 15 Bibliography 16 Introduction Hollywood has gone digital, and the old ways of doing things are dying. Animation and special effects created with computers have been embraced by television networks, advertisers, and movie studios alike. Film editors, who
  • Computer programer
    computer programer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencies
  • Computer Programmer
    Computer Programmer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencie
  • Computer underground
    computer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast t
  • Contrast DOS to Unix
    Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX Arthur Bennis Microcomputer Operating Systems CGS 1560 INTRODUCTION As is suggestive of its name, an operating system (OS) is a collection of programs that operate the personal computer (PC). Its primary purpose is to support programs that actually do the work one is interested in, and to allow competing programs to share the resources of the computer. However, the OS also controls the inner workings of the computer, acting as a t
  • Electronic Commerce
    Electronic Commerce Table of Contents Introduction…………………………………………………………………2 History of E-commerce……………………………………………………..4 Economic Impact……………………………………………………………5 Advantages of E-commerce…………………………………………………5 Disadvantages of E-commerce……………………………………………...7 The Future of E-commerce………………………………………………….9 Summary…………………………………………………………………...11 References………………………………………………………………….12 Electronic Commerce Electronic commerce, or e-commerce has developed very rapidly in the last few years and has left some
  • Getting paid to hack
    Getting paid to hack Many of the products we buy today are no more than large collections of zeroes and ones. High-priced software, high-quality music, and valuable reference material such as computerized databases or CD-Rom encyclopedias are commercial products like any other, but the media of their transmission makes them different in at least one aspect: it is possible to copy them freely, or at least extremely cheaply. A compact disc of Elvis Costello and the Attractions is different from, s
  • Hacking a Art
    Hacking a Art In today\'s fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger than I have, so consequently I have to search for a career in a field that will offer me adequate financial rewards in a limited amount of time. I started working with computers four years ago, upgrading systems, and increasing modem speeds to enable me access to the World Wide Web. I find programming to be the most interesting
  • History of Computer Industry
    History of Computer Industry History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been a
  • IT related terms
    IT related terms IT RELATED TERMS UNIX A high-level programming language developed by Dennis Ritchie at Bell Labs in the mid 1970s. Although originally designed as a systems programming language, C has proved to be a powerful and flexible language that can be used for a variety of applications, from business programs to engineering. C is a particularly popular language for personal computer programmers because it is relatively small -- it requires less memory than other languages. The first majo
  • Java
    java Java Java is the substance whose aroma is awakening the Internet community. It is a new programming language developed by Sun Microsystems that has much in common with the beverage that shares its name. It\'s good, it\'s hot, and people know it around the world. Java (the programming language) beats the other stuff hands down though, it\'s free. Many have heard of Java, yet few know what it is, or what it can do. It certainly has the potential to become a part of our everyday lives, existin
  • No silver bullet
    No silver bullet Abstract The objectives of this essay are to examine whether or not Brook’s original scepticism that “no single new development in the next ten years would give software developers an order-of-magnitude improvement in productivity, reliability, or simplicity” and “…future progress depends upon addressing the data” are reversible. We will discuss Brook’s original thoughts and we will try to give alternative solutions (if any). This essay, in general, accepts Brook’s thoughts as h
  • None Provided1
    None Provided1 In today\'s fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger than I have, so consequently I have to search for a career in a field that will offer me adequate financial rewards in a limited amount of time. I started working with computers four years ago, upgrading systems, and increasing modem speeds to enable me access to the World Wide Web. I find programming to be the most interestin
  • ObjectOriented Programming vs Procedural Programmi
    ObjectOriented Programming vs Procedural Programming It was way back in the 1970’s when Kernighan and Ritchie were working on creating a new programming language they would soon call C. It was called this because a language called B preceded it. C was created with simplicity and flexibility in mind. Its primary use was for writing operating systems, however it became popular for a wide variety of other programs. The one thing that C lacked was support for objects; it was a procedural-oriented pr
  • Operating Systems
    Operating Systems Purpose The first thing I wanted to do for this project was to determine how the computer system I chose was going to be used. I wanted to purchase a personal computer system, with monitor and printer that I could use to do Web-based research. The research will be done out of my house. It will be primarily based on comparing different start-up companies to determine investments for the future. Since I determined that all my research was going to be over the Internet, it was imp
  • Personality
    Personality Personality Working with computers is a great pleasure for anyone who ever has really discovered how they work. Maintaining computers can broken into a very broad range of duties or jobs. Two of my favorite, Programming and Network Administration, present me with the greatest interest. Computer programmers and network administrators are given great job opportunities in this technology world. Both require time, patience, high levels of college, and training. Programmers are required t
  • Plus
    plus Introduction -------------------------------------------------------------------------------- Sather is an object oriented language designed to be simple, efficient, safe, and non-proprietary. It aims to meet the needs of modern research groups and to foster the development of a large, freely available, high-quality library of efficient well-written classes for a wide variety of computational tasks. It was originally based on Eiffel but now incorporates ideas and approaches from several lan
  • Polymorphic
    Polymorphic Polymorphic & Cloning Computer Viruses The generation of today is growing up in a fast-growing, high-tech world which allows us to do the impossibilities of yesterday. With the help of modern telecommunications and the rapid growth of the personal computer in the average household we are able to talk to and share information with people from all sides of the globe. However, this vast amount of information transport has opened the doors for the computer "virus" of the future to flouri
  • Programming Languaguages
    Programming Languaguages Programming Languages A programming language is a set of English-like instructions that includes a set of rules for putting the instructions together to create commands. A translator changes the English-like commands into numeric code that the computer can understand. The most common type of translator is a compiler. The compiler is program that reads English-like commands in a file and than creates another file containing computer readable numeric code or commands. I wi
  • System Analyst
    System Analyst Systems analysts solve computer problems and enable computer technology to meet individual needs of an organization. They help an organization realize the maximum benefit from its investment in equipment, personnel, and business processes. This process may include planning and developing new computer systems or devising ways to apply existing systems resources to additional operations. Systems analysts may design new systems, including both hardware and software, or add a new sof
  • The First Chapter of computer Languages
    The First Chapter of computer Languages The Tortuous Path of Early Programming. In the perpetual darkness more than two miles below the surface of the North Atlantic, a submersible sled slowly traced the alpine contours of the ocean bottom in the summer of 1985. Named the Argo after the ship in which the legendary Greek Hero Jason sought the Golden Fleece, the 16-foot-long craft resembled a section of scaffolding flung on its side and stuffed with equipment, Powerful lights, sonar, Video cameras
  • The Internet
    The Internet The Internet is, literally, a network of networks. It is made of thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to humble PCs in people\'s homes and offices. Despite the recent publicity, the Internet is not a new thing. Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense\'s communications systems. Fearing the consequ
  • The Millenium Bug
    The Millenium Bug The Millennium Bug The millennial sun will first rise over human civilization in the independent republic of Kirbati, a group of thirty low lying coral islands in the Pacific Ocean. Kirbati straddles the equator and the International Dateline halfway between Hawaii and Australia. “For those who live in a world that relies on satellites, air, rail and ground transportation, manufacturing plants, electricity, heat, telephone, or TV, when the calendar clicks ’99 to ’00, we will ex
  • The Rise of the Y2K Bug
    The Rise of the Y2K Bug "The Y2K problem is the electronic equivalent of the El Niño and there will be nasty surprises around the globe."--John Hamre, Dep. Secretary of Defense When I was in the first grade, my elementary school invested in several computers and started Introduction to Computers classes. I remember playing math games and drawing with art programs, in awe of, and slightly intimidated by the beastly piece of technology in front of me. I had little idea of how it worked, and even l
  • The wave of the future
    The wave of the future The wave of the future is drowning out very quickly. All the technology we have created will bit the dust before the systems really are used. At the end of the century all systems that have calendars to monitor systems or use calendars to show dates will shut down all at once. Major electronic systems such as elevators, alarm systems, fax machines, telephones, cars with computer systems will be nothing more than paper weights or wall designs nothing more. For years compute
  • The Y2K Bug
    The Y2K Bug The year 2000 problem could have been completely prevented had some early people envisioned the degree to which the microprocessor would change our lives. Surely, no one would have thought that in the early days of ENIAC that everything from your alarm clock to your car would be computerized. Even the IT managers of the 80\'s could not be blamed: The disk space savings from dropping the two digits of the date over 100 Million Records would represent almost 200 Megabytes! Space requir
  • The year 2000 bug
    the year 2000 bug Do you have a home computer or a small business with a computer? You have undoubtedly read or heard information about the upcoming new century and are wondering if you need to do something to help your PC make the transition into the year 2000. This site is constructed to help you answer that question, and to help you sort fact from fiction. The way that your computer system will be affected by the year 2000 will depend not only on the equipment and software that you have, but
  • Web advertising
    web advertising web advertising Web Advertising Web advertising, not to mention the Internet itself, finds itself in a stage of relative infancy and therefore provides marketers with novel challenges and situations which need to be dealt with caution . The realm of Web advertising is unchartered terri tory! In terms of South Africa, the country finds itsef somewhat behind technologically. However, this may not prove to be a disadvantage as the uncertain nature of Web advertising may make a polic
  • Y2K1
    Y2K1 What is Y2K and What Effect Did It Present On Modern Culture? Two seemingly small digits may turn January 1, 2000 from a worldwide celebration into a universal nightmare. Affecting companies worldwide, many pay millions upon millions of dollars in order for computers to recognize the difference between the years 2000 and 1900. One of the world’s most detrimental dilemmas, the year 2000 computer bug is an extensive and interesting problem that everyone must face. The definition and implicati
  • Napster First Amendment right
    Napster First Amendment right Napster: To Be or Not To Be Napster (http://www.Napster.com) is a company that operates exclusively online as a virtual music forum. Napster not only allows its visitors the ability to participate in ongoing discussions through its message board forums and online virtual chat rooms, but it also allows its visitors the capability to exchange music files (MP3s) with other Internet users. Because Napster is a "virtual" online public forum, Napster should be protected u
  • Napster Wars
    Napster Wars Fifth Amendment “A young Shaun Fanning, attending school in high school in Harwich, Massachusetts had two loves: 1) Sports ( baseball, basketball, and tennis ) and 2) computers. As his curiosity grew for computers, he decided to stop his sport playing, and spend most of his time working with computers. He primarily focused on two aspects of the computer, programming and the Internet. His computer fascination grew into an obsession throughout high school. His freshman year at Northea
  • Privacy and Information Technology
    Privacy and Information Technology Geoffrey Graves MG3700 Mid Term Exam 4/24/2000 Part I 1.) In order to produce an upwards swing in revenue, Toy World must track its customer’s buying trends with more accuracy and more detail. The Point of Sale system that they are currently working from can be improved and made to reduce after-market inventory. Trend data can be used for a wide variety of purposes. One of the first problems is the store design and layout of items. Sale items and hot merchandis
  • Monopoly
    Monopoly Joseph Economics This paper will show my opinion of Microsoft being branded a monopoly. I feel this example shows supply and demand in addition to monopolistic competition. This entire ordeal is over a free browser that Microsoft includes with windows for free and gives out on the internet for free just as Netscape and most other browser companies do. The government feels that Microsoft is creating a demand purely for their products by forcing its browser on suppliers and controlling pr
  • The Case for Microsoft
    The Case for Microsoft The Case FOR Microsoft As far as I\'ve seen, this entire ordeal is over a FREE browser that Microsoft includes with windows for FREE and gives out on the internet for FREE just as Netscape and most other browser companies do. I have yet to see where Microsoft is charging extraordinary prices for any of these FREE programs nor do I see how Netscape, in using the governments definition, a "monopoly" itself, is "being forced out of business" by Microsofts FREE browser. Remem
  • Computer Based Training Business Interchange
    Computer Based Training Business Interchange COMPUTER BASED TRAINING (CBT) BUSINESS INTERCHANGE Dallas Baptist University Spring 1999 MISM 6330, Section 01 Database Management Systems Instructor: Mary Braswell, MBA Mary L. Everitt 19 April 1999 Table of Contents Introduction Computer-based training (CBT) is an all-encompassing term used to describe any computer-delivered training including CD-ROM and the World Wide Web. CBT courseware curriculum development involves the use of integrated multime
  • Multiple Intelligence
    Multiple Intelligence Harold Gardner (1983) of Harvard University has identified several kinds of intelligence people possess. Particularly, this finding poses significant implications in classroom instructions. More often than not, children and even adults (who are grown up children) are labeled negatively if and when they manifest either a very fast, slow or no understanding at the entire subject matter. Identifying children’s various strengths among these intelligences will direct the teacher