Premium Essay

Computer 1

In: Business and Management

Submitted By basabasadin
Words 685
Pages 3
Title: An Inky Study on the Internet
Company & URL:
MARCOP INK & TONER CO.

Company’s Website: http://www.marcopinkandtoner.net/about.html
Company’s Facebook page: http://www.facebook.com/marcop.inktonerco?sk=wall
Other websites: http://www.tipidpc.com/useritems.php?username=kaspog22 http://pogiako22.sulit.com.ph/
Challenge:
* How to generate traffic and making people notice their site/ad. * Converting their traffic to sales, encouraging your visitors to purchase your product. * Earning the trust of their customers to purchase online. * Creating a webpage that's convenient to the customer. * Having a competitive SEO (search engine optimization), would help the customer to easily find their site/page. * Having to compete and raise above all the big time companies. * How capture big clients and loyalty. * How to prioritize the limited resources for better profit. * How to manage an online marketing body or systems. * Converting leading brands to sale.
Background:
MARCOP INK & TONER CO. was initiated by its corporate owners on January 26, 2006 as a sister company of MARCOP ENTERPRISE. It is a wholesaler and retailer of all types of office supplies, which includes original consumables such as LaserJet toners and DeskJet for HP, Canon, and Epson printer brands and models. The company was built to provide and serve much more companies and institutions with their corporate requirements of all types of office consumables and peripherals referring to computer.
NATURE OF BUSINESS
It is a wholesaler and retailer of office accessories (printer, fax, and computer peripherals), office consumables (toners, inks, and ribbons), continuous ink supply system (CISS), and printer repair. It is also a dealer of Hewlett Packard, Epson, and Canon products and other toner and ink cartridges.
PRODUCTS
Cartridges…...

Similar Documents

Premium Essay

Unit 1. Assignment 1. Home Computer Analysis

...Fortunately my home computer is already running Windows 7 ultimate x64 edition so there isn’t anything for me to upgrade to yet, unless windows 8 gets released soon but even then I won’t probably upgrade. My computer is home built and has an Intel E8400 3.0 Gig Dual Core processor with 4 gigs of DDR3 and 2 Terabytes of hard drive space. I’m also running an NVidia GTX 560 TI overclocked video card and hooked up to a 50 Mbps cable modem. I built this computer a few years ago and I built it for gaming so it’s not top of the line anymore but more than supports any operating system you can throw at it. Let’s suppose I had windows 7 Home Premium and wished to upgrade. Luckily my computer can easily support any version of windows 7 so all I would have to do is run the Windows Anytime Upgrade and upgrade to which version I wished. Since each version is a superset of the higher version you can easily upgrade to higher versions. Also since windows 7 places the entire OS on the hard disk it isn’t an upgrade in the traditional since, it’s just a matter of activating features that are already there. If I had a 32 bit version and wished to go to a 64 bit version I wouldn’t however be able to do an anytime upgrade. When your going from different bit versions you need to do a clean install to install the whole 32 or 64 bit version. This is the only time I would need to do a clean install, if I wanted to go back to x32 for some strange reason. Doing this of course would limit the amount of......

Words: 316 - Pages: 2

Premium Essay

Case Study 1: Apple Computer

...1) What were some of Apple’s biggest successes and failures? Describe why. Apple’s biggest success stories are not difficult to find. When Apple creates a product that succeeds, they do it in a big way. Take, for example, the iPhone. Not only does the iPhone have a die-hard following of loyal aficionados that continue to buy upgrades to their iPhones on a regular basis, but the iPhone changed the way the entire world looked at cell phones. Beating the first Android phone to the market by a more than a year (Parrish, May 3, 2012), the iPhone took us from phones that looked and functioned strictly like phones, to multi-touch devices that combined phones, cameras, games and MP3s into one device. Another big success for Apple was the iPod. Even though it wasn’t the first MP3 player out there, according to The Telegraph, “Apple's iPod arguably kick-started the digital music revolution.” due in part to the ability to create playlists and shuffle songs. It also integrates seamlessly with iTunes, another major success for Apple. iTunes allows you to purchase, categorize, store and update your music and iPod all from your own personal computer. Using iTunes enables consumers to obtain all of their music, app, television, movie and reading needs in one place—and is functional across technology platforms, allowing for more portability of a customer’s media. There are entire industries that base their product launches on the needs of iTunes, iPhone and iPod......

Words: 1058 - Pages: 5

Premium Essay

Assignment 1: Computer Architecture

...Assignment 1: Computer Architecture Noel E Baez Professor Ali Abedin Introduction to Information Technology July 25, 2013 Abstract This paper will describe the Von Neumann Architecture and explain why it is important. It will describe and explain what a system bus is, and why it is needed in the computer system. A summary of the Boolean operators and the use in computers calculations will be included as well. Finally, a short list of various types of computer storage and memory will be included, and a definition of computer storage. Keywords: Neumann, Boolean, Memory, Storage, System, Bus John Von Neumann was born in 1903 in Budapest. He studied mathematics and graduated from the Pázmány Péter University in Budapest with a Ph.D. In 1930 he was invited to the University of Princeton to teach mathematics in the Institute for Advance Study of Princeton. Von Neumann possessed an extraordinary memory, he was a gifted man that made multiple contributions to the math world, and the computer world, but perhaps his biggest contribution is the creation of the Von Neumann Architecture. The Von Neumann architecture stated that a computer was able to have an uncomplicated, established structure, able to execute any calculation when given the proper command. The Model of this architecture is comprised of the following components, the memory, the control unit, the arithmetic logic unit (ALU). The memory was used to store the information from the ALU or processing unit. ......

Words: 1474 - Pages: 6

Premium Essay

Case Analysis 1 – Apple Computer

...What were some of Apple's biggest successes and failures? Describe why. I believe Apple's biggest success was the beginning or Apple's initial offer Apple I in 1976, this was mostly a prototype since there where only around 200 Apple I computers produced; they were all hand-built by Apple co-founder Steve Wozniak. While Steve Jobs handled the distribution and marketing of the Apple I, he was responsible for devising clever advertising tag-line: "Byte into an Apple." That was the beginning of Apple's innovating strategy, first out the door with the interactive graphical microcomputer, that Steve Jobs used to build upon, trough successes and failures. To Steve Wozniak it was about the product, reducing cost, simplicity, etc., but to Steve Jobs it was about to embark on building Apple computer corporation, a culture, a vision, at each reiteration he would discover a new principle of innovation, but I believe he would not truly understand that, until some twenty four plus years later, it will be interesting to see whether Tim Cook the new COO of Apple, keeps Apple on course, on the vision. Now, let's look at some of Apple's important success, like Mac OS X, server version was introduced in 1999, while the desktop version was introduced in 2001. Then there was iTunes, this was the BIG one, truly a innovative idea that would put Apple over the top (regardless that Apple is proprietary in nature), as one of the innovating companies, along with the iPod, also introduced in 2001,......

Words: 1363 - Pages: 6

Premium Essay

Unit 1 Assignment 1 Home Computer Analysis

...Unit 1 - Assignment 1 - Home Computer Analysis Fortunately my home computer is already running Windows 7 ultimate x64 edition so there isn’t anything for me to upgrade to yet, unless windows 8 gets released soon but even then I won’t probably upgrade. My computer is home built and has an Intel E8400 3.0 Gig Dual Core processor with 4 gigs of DDR3 and 2 Terabytes of hard drive space. I’m also running an NVidia GTX 560 TI overclocked video card and hooked up to a 50 Mbps cable modem. I built this computer a few years ago and I built it for gaming so it’s not top of the line anymore but more than supports any operating system you can throw at it. Let’s suppose I had windows 7 Home Premium and wished to upgrade. Luckily my computer can easily support any version of windows 7 so all I would have to do is run the Windows Anytime Upgrade and upgrade to which version I wished. Since each version is a superset of the higher version you can easily upgrade to higher versions. Also since windows 7 places the entire OS on the hard disk it isn’t an upgrade in the traditional since, it’s just a matter of activating features that are already there. If I had a 32 bit version and wished to go to a 64 bit version I wouldn’t however be able to do an anytime upgrade. When your going from different bit versions you need to do a clean install to install the whole 32 or 64 bit version. This is the only time I would need to do a clean install, if I wanted to go back to x32 for some strange......

Words: 323 - Pages: 2

Premium Essay

Lab 1 Computer Structure and Logic

...Task 1: Von Neumann Model: Input Input Output Output Central Processing Unit Central Processing Unit Accumulator Accumulator Arithmetic Logic Unit Arithmetic Logic Unit Control Unit Control Unit Memory Memory Component | Function | Arithmetic Logic Unit | Control operations between all components of the computer. | Accumulator | Store the result of the last calculation.Registers that store temporary numbers,And can be hard-wired to the logic unit.They we developed so that fewer bits couldBe used for instructions and operands. | Control Unit | Controls operations betweenAll components of the computer. | Input | Provides data to the computer from the user. | Memory | Stores program instructions and data. | Output | Displays data to the user. | Task 2: These are the common input, output, and memory components: Component | Function | Input | Keyboard, Mouse, Gaming Controller, Microphone, Camera | Magazines | Video Display, Speaker, Printer, Mouse | Memory | Motherboard RAM, system BIOS ROM, hard disk, CD/DVD disk, speakers | There are some devices that are both input and output devices. These include modems, network......

Words: 382 - Pages: 2

Free Essay

Computer Lab 1

...Elizabeth Romero Computer and Logic Week 2 Lab Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? I found all four of them. 2. Label the appropriate names to the ports and adaptors given below. Ps/ 2 port USB ports Serial port VGA port Speakers Line in Microphone Ethernet port Pt 1 printer port Game port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). Memory Stick Slot Micro Drive Slot Compact Flash Slot Secure Digital Slot 1. Explain the diagram or photo(s) with the name of each type of memory slot. Memory Stick – is a removable flash memory card format. Electronic flash memory data storage device. Micro Drive- is an extremely small hard disk that can fit in a compact card memory slot. Compact flash- is a flash memory mass storage device used mainly in portable electronic devices. Secure digital- is a non-volatile memory card used extensively in portable devices. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. When a SCSI host adapter card with internal and external connection is used, the SCSI daisy chain can extend through the card. The...

Words: 392 - Pages: 2

Premium Essay

Micro Computers Quiz 1

...Part 1 1. What are the Sales Amount by Channel? SELECT DimChannel.ChannelName, Sum(FactSales.SalesAmount) AS SumOfSalesAmount FROM DimChannel INNER JOIN FactSales ON DimChannel.ChannelKey = FactSales.channelKey GROUP BY DimChannel.ChannelName; a. By Channel by Year SELECT DimChannel.ChannelName, DimDate.FiscalYear, Sum(FactSales.SalesAmount) AS SumOfSalesAmount FROM DimDate INNER JOIN (DimChannel INNER JOIN FactSales ON DimChannel.ChannelKey = FactSales.channelKey) ON DimDate.Datekey = FactSales.DateKey GROUP BY DimChannel.ChannelName, DimDate.FiscalYear; b. Show the results with the best year at the top SELECT DimChannel.ChannelName, DimDate.FiscalYear, Sum(FactSales.SalesAmount) AS SumOfSalesAmount FROM DimDate INNER JOIN (DimChannel INNER JOIN FactSales ON DimChannel.ChannelKey = FactSales.channelKey) ON DimDate.Datekey = FactSales.DateKey GROUP BY DimChannel.ChannelName, DimDate.FiscalYear ORDER BY Sum(FactSales.SalesAmount) DESC; 2. What are the different types of Promotions? SELECT DimPromotion.PromotionName FROM DimPromotion; c. What are the start and end dates for each promotion. Put the oldest start dates first SELECT DimPromotion.PromotionName, DimPromotion.StartDate, DimPromotion.EndDate FROM DimPromotion ORDER BY DimPromotion.StartDate; 3. What are the quantity and the amounts of items returned grouped by Channel then by Manufacturer? SELECT DimChannel.ChannelName, DimProduct.Manufacturer,......

Words: 318 - Pages: 2

Premium Essay

Assignment 1: Digital Computer Crimes

...Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second......

Words: 1501 - Pages: 7

Premium Essay

Case Analysis 1- Apple Computer

...XXXX Case Analysis 1- Apple Computer NETW-583 7/12/15 Apple’s greatest achievement could be defined not as its comeback from the precipice of bankruptcy but as the indelible mark it has left on the technological landscape and online business. Design is high on this list of legacy achievements. Apple products share a minimalist architecture that is unique, user friendly and instantly recognizable. Due to the degree of this branding by design, Apple has even taken Samsung to court over what they deemed to be infringement over the look and feel of their iPhone (Robertson, 2015). Apple has also influence how users interface technology by with touch sensitive surfaces. With the arrival of the first iPhone, a new standard of tapping and moving a fingertip along a screen to select menus, scroll through documents, or magnifying viewing space was introduced (Tynan, 2015). Apple rolled out a continuous stream of stream of products that created entire new IT categories of product lines with the iPhone, iPod, iPad, and are now continuing to incorporate their products into everyday accessories such as watches to further imbed themselves into the daily lives of the masses. Apple has also altered music by changing the way that it is bought and sold through the creation of iTunes. Hollywood was the next stop as Apple brought movies and TV shows to all manner of handheld devices and helped to assist with legitimizing streaming services (Tynan, 2015). Not all of Apple’s attempts......

Words: 1003 - Pages: 5

Free Essay

Assignment 1: Computer Forensics Overview

...Assignment 1: Computer Forensics Overview CIS 417 Computer Forensics Computer forensics is the process of investigating and analyzing techniques to gather and preserve information and evidence from a particular computing device in a way it can be presented in a court of law. The main role of computer analyst is to recover data including photos, files/documents, and e-mails from computer storage devices that were deleted, damaged and otherwise manipulated. The forensics expert’s work on cases involving crimes associated with internet based concerns and the investigations of other potential possibilities on other computer systems that may have been related or involved in the crime to find enough evidence of illegal activities. Computer experts can also use their professional knowledge to protect corporate computers/servers from infiltration, determine how the computer was broken into, and recover lost files in the company. Processes are used to obtain this information and some of the processes are as follows; * Investigation process: Computer forensics investigations will typically be done as part of a crime that allegedly occurred. The first step of the investigation should be to verify that a crime took place. Understand what occurred of the incident, assess the case, and see if the crime leads back to the individual. * System Description: Next step, once you verified the crime did occur, you then begin gathering as much information and data about the specific...

Words: 1397 - Pages: 6

Free Essay

Computer Structure and Logic Lab 1

...Computer Structure and Logic Lab 1 12/17/2015 The computer I am working on right now has Windows 7 Installed on it. Windows 7 is not perfect. Some features are underdeveloped. For example when typing the cursor will move through the document. And some annoyances remain intact. But overall, the final version appears to be a worthy replacement to Windows XP. In window 7 you can take the Screen and split it into two. This is a great feature when you are writing a paper and doing research at the same time. To do this just click on the middle of the tab bar and drag left or right, then take your other screen and go the opposite way. In windows 7 you can now pin Icons to the task bar. For example you can pin chrome to your task bar, to do so open chrome, it will appear in the task bar when it does right click on it. Click on pin to task bar, now you have easy access to chrome. Windows 7 started the “Peak”. You can take your mouse and hover your mouse over an icon on the task bar that is active, when you do this a small screen pops up and you can see what is in that tab. Desktop Gadgets can be added to windows 7. You can add the Weather or even a picture slideshow to the desktop, just right click on your desktop and click on gadgets. Double click on the gadget you want and it will appear on your desktop. The desktop I am using has an Intel Core Processor the CPU is running at 3.30 GHz. It has 8 GB of RAM wish it had at least 16. Service Pack 1 is on this computer. SP1 is...

Words: 341 - Pages: 2

Premium Essay

Assignment 1: Computer Memory Hacking

...Assignment 1: Computer Memory Hacking Professor Carl Brown CIS 106 Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008). This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If......

Words: 901 - Pages: 4

Free Essay

Computer Networking Assignment 1

...Unit 1 Assignment Dan SItkowski 1. Cell phones uses both voice and data networks. It uses data to get information and to also be allowed to access the internet. It also uses voice when you make a call. 2. Land phones use both networks. It uses data for caller ID and to send the information to find out where the call will be going. It also uses voice to transmit back and forth so that you can have a convocation. 3. SMS/Text messaging uses data networks. It only uses data networks because you are sending a message to another person. And in that message you can have files attached to the message as well. 4. Fax machines uses a data network. It uses this network because you put a document or photo threw the machine and it takes the image of that and creates a file. It then takes that file and sends it to another location. Then that location opens and prints or views the file. 5. Pagers use only data networks. It only uses data networks because when you send a file containing only text and then send it to a pager. The pager then takes that file and opens it showing the text for that person to read. 6. VOIP (voice over IP) uses data networks. VOIP uses data networks only because It uses the internet to talk to people instead of the traditional voice network. This allows someone to bypass the phone company. It works by taking the conversation and converts it to a file that is sent to the other location where it is opened. The problem with this is that if......

Words: 307 - Pages: 2

Premium Essay

Case Analysis 1 - Apple Computer

...1. What were some of Apple’s biggest successes and failures? Describe why. iTunes was announced in January 2001 as an all-in-one digital music program. iTunes immediately made an impact on a dying music industry as it brought a different approach to how consumers purchase music. The music consumer industry had been going through a change in how music was being used in terms of devices. Consumers were utilizing digital technology devices to download songs instead of using CD's. iTunes was a way for consumers to personalize their music experience within a downloadable software application. iTunes allows users to download MP3, use Internet Radio, write CD's and purchase songs from their favorite artists at a low cost of $.99. iTunes announcement also sparked the cloud revolution. Apple's iOS App Store was launched in July 2008 as a tool for consumers to use to download applications for their smart phones or smart devices. Apple announced a milestone in July 2011 in that it had reached it 15 billionth download of more than 500,000 applications. The App Store has become the cornerstone of the iPhones success. The App Stores success is driving the markets in that it’s creating new markets for software developers. Their biggest success of Apple is bringing back the late Steve Jobs. Without Jobs, Apple would be a thing of the past. Jobs came back to Apple in July 1997 as the interim CEO after Apple had posted a $1 billion loss in revenues and stock was trading at...

Words: 1132 - Pages: 5