Computer
in sentence
2497 examples of Computer in a sentence
So if we give one
computer
to one person, and we multiply that times five billion, even if that laptop is a hundred dollars, then we would have 483 trillion dollars.
We wanted to increase the number of users per
computer
in such a way that we could dilute the cost of infrastructure, the cost per user, and that we could bring education and technology to everybody within these communities.
Another thing with One Laptop per Child is that it doesn't guarantee the educational use of a
computer.
And you can't pretend to have a relationship of only a
computer
with a child.
So we create a route, a very basic learning route, where we teach people how to use a computer, how to use the internet, how to use office software, and in 72 hours, we create digital citizens.
You can't pretend that people are just going to touch a
computer
and become digitally included, you need to have a process.
I had the good fortune to go to Disney Animation and study over 900 scientists, artists, storytellers,
computer
scientists as they teamed up in constantly changing configurations to create amazing outcomes like "Frozen."
A class of problems that has been studied extensively by mathematicians and
computer
scientists.
As a side effect, I get to see how applying a little bit of
computer
science can make human decision-making easier.
For those problems, it's worth consulting the experts:
computer
scientists.
When you're looking for life advice,
computer
scientists probably aren't the first people you think to talk to.
But thinking about the
computer
science of human decisions reveals that in fact, we've got this backwards.
In that situation, you run up against what
computer
scientists call the "explore-exploit trade-off."
Over the last 60 years,
computer
scientists have made a lot of progress understanding the explore/exploit trade-off, and their results offer some surprising insights.
Computer
science can also help to make it easier on us in other places at home and in the office.
In order for the
computer
to operate as efficiently as possible, you want to make sure that the pieces of information you want to access are in the fast memory system, so that you can get to them quickly.
Each time you access a piece of information, it's loaded into the fast memory and the
computer
has to decide which item it has to remove from that memory, because it has limited capacity.
Over the years,
computer
scientists have tried a few different strategies for deciding what to remove from the fast memory.
Your wardrobe is just like the
computer'
s memory.
So if we go back to Martha's four questions, the
computer
scientists would say that of these, the last one is the most important.
But even in those cases,
computer
science can offer some strategies and perhaps some solace.
Ultimately,
computer
science can help to make us more forgiving of our own limitations.
She opened a
computer
store, then studied to be a beautician and opened another business.
I'm a
computer
science professor, and my area of expertise is
computer
and information security.
And, you know, that's a perfectly reasonable thing for her to think, because I told her I was working in
computer
security, and it was interesting to get her perspective.
And I'm not a doctor, but I reassured her that it was very, very unlikely that this would happen, but if she felt more comfortable, she could be free to use latex gloves when she was on the computer, and there would be no harm whatsoever in that.
I'm going to get back to this notion of being able to get a virus from your computer, in a serious way.
In 2006, we hit an important milestone from the perspective of
computer
security.
One thing that brings us close to home is we look at Dick Cheney's device, he had a device that pumped blood from an aorta to another part of the heart, and as you can see at the bottom there, it was controlled by a
computer
controller, and if you ever thought that software liability was very important, get one of these inside of you.
The way that the researchers did this work is, they read the software in the
computer
chips that were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that software, and then they built exploits to exploit those.
Back
Next
Related words
About
Could
There
Which
Would
Their
People
Science
World
Other
Years
First
Actually
Where
Really
Program
Movie
Technology
Human
Graphics