SlideShare a Scribd company logo
Write a 7 page paper in APA format.
The research paper should include the following sections.
Discuss the competitors, future, and innovations with
computing. Using the outline below:
Cover page
Introduction – (Thesis statement and Purpose of paper)
Background – Background and History on the concept
Discussion – Discuss current issues, innovation, and future use.
Support the topic with any necessary sources. Be sure to include
in-text citations.
Conclusion – Summary of main points
Theory in Action: IBM and the Attack of the Clones
In 1980, IBM was in a hurry to introduce a personal computer.
When personal computers first began to emerge at the end of the
1970s, most of the major computer manufacturers considered it
no more than a peculiar product for a hobbyist market. The idea
that individuals would want personal computers on their desks
seemed ludicrous. However, as total U.S. personal computer
sales reached $1 billion, IBM began to worry that the personal
computer market could actually turn out to be a significant
computer market in which IBM had no share. To bring a
personal computer to market quickly, IBM decided to use many
off-the-shelf components from other vendors, including Intel's
8088 microprocessor and Microsoft's software. However, IBM
was not worried about imitators because IBM's proprietary basic
input/output system (BIOS), the computer code that linked the
computer's hardware to its software, was protected by
copyright. While other firms could copy the BIOS code, doing
so would violate IBM's copyright and incur the legendary wrath
of IBM's legal team. However, getting around IBM's copyright
turned out not to be difficult. Copyright protected the written
lines of code, but not the functions those codes produced.
Compaq was able to reverse-engineer the BIOS in a matter of
months without violating IBM's copyright. First, a team of
Compaq programmers documented every function the IBM
computer would perform in response to a given command,
without recording the code that performed the function. This list
of functions was then given to another team of “virgin”
programmers (programmers who were able to prove that they
had never been exposed to IBM's BIOS code).a These
programmers went through the list of functions and wrote code
to create identical functions. The result was a new BIOS that
acted just like an IBM BIOS but did not violate its copyright.
Compaq sold a record-breaking 47,000 IBM-compatible
computers in its first year, and other clones were quick to
follow.
a R. Cringely, Accidental Empires (New York: HarperCollins,
1992).
Writ
e a 7 page paper in APA format.
The research paper should include the following sections.
Discuss the competitors, future, and
innovations with computing.
Using the outline below:
Cover page
Introduction
–
(Thesis
statement and Purpose of paper)
Background
–
Background and History on the concept
Discussion
–
Discuss current issues, innovation, and future use. Support the
topic with any
necessary sources. Be sure to include in
-
text citations.
Conclusion
–
Summary of
main points
Theory in Action
:
IBM and the Attack of the Clones
In 1980, IBM was in a hurry to introduce a personal computer.
When personal computers first
began to emerge at the end of the 1970s, most of the major
computer manufacturers considered it
no more than a peculiar product for a hobbyist market. The idea
that individuals would want
personal computers on their desks seemed ludicrous. However,
as tota
l U.S. personal computer
sales reached $1 billion, IBM began to worry that the personal
computer market could actually
turn out to be a significant computer market in which IBM had
no share. To bring a personal
computer to market quickly, IBM decided to us
e many off
-
the
-
shelf components from other
vendors, including Intel's 8088 microprocessor and Microsoft's
software. However, IBM was not
worried about imitators because IBM's proprietary basic
input/output system (BIOS), the
computer code that linked the c
omputer's hardware to its software, was protected by copyright.
While other firms could copy the BIOS code, doing so would
violate IBM's copyright and incur
the legendary wrath of IBM's legal team. However, getting
around IBM's copyright turned out
not to
be difficult. Copyright protected the written lines of code, but
not the functions those
Write a 7 page paper in APA format.
The research paper should include the following sections.
Discuss the competitors, future, and
innovations with computing. Using the outline below:
Cover page
Introduction – (Thesis statement and Purpose of paper)
Background – Background and History on the concept
Discussion – Discuss current issues, innovation, and future use.
Support the topic with any
necessary sources. Be sure to include in-text citations.
Conclusion – Summary of main points
Theory in Action: IBM and the Attack of the Clones
In 1980, IBM was in a hurry to introduce a personal computer.
When personal computers first
began to emerge at the end of the 1970s, most of the major
computer manufacturers considered it
no more than a peculiar product for a hobbyist market. The idea
that individuals would want
personal computers on their desks seemed ludicrous. However,
as total U.S. personal computer
sales reached $1 billion, IBM began to worry that the personal
computer market could actually
turn out to be a significant computer market in which IBM had
no share. To bring a personal
computer to market quickly, IBM decided to use many off-the-
shelf components from other
vendors, including Intel's 8088 microprocessor and Microsoft's
software. However, IBM was not
worried about imitators because IBM's proprietary basic
input/output system (BIOS), the
computer code that linked the computer's hardware to its
software, was protected by copyright.
While other firms could copy the BIOS code, doing so would
violate IBM's copyright and incur
the legendary wrath of IBM's legal team. However, getting
around IBM's copyright turned out
not to be difficult. Copyright protected the written lines of
code, but not the functions those
 Write a 7 page paper in APA format.The research paper should in.docx

More Related Content

Similar to Write a 7 page paper in APA format.The research paper should in.docx

Modern CPUs
Modern CPUsModern CPUs
Modern CPUs
Akil Arafat Siam
 
January 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docx
January 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docxJanuary 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docx
January 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docx
vrickens
 
Fourth Generation Computers
Fourth Generation ComputersFourth Generation Computers
Fourth Generation ComputersJessa Ü Borja
 
4th gen microprocessor
4th gen microprocessor4th gen microprocessor
4th gen microprocessor
AvantikaBadgujar
 
Apple SWOT
Apple SWOTApple SWOT
Apple SWOTvagmi369
 
Appendix a web
Appendix a webAppendix a web
Appendix a webSami Khan
 
Appendix a web2
Appendix a web2Appendix a web2
Appendix a web2Sami Khan
 
Fourth Generation Computers.pptx
Fourth Generation Computers.pptxFourth Generation Computers.pptx
Fourth Generation Computers.pptx
Abi Abi
 
A seminar report on Raspberry Pi
A seminar report on Raspberry PiA seminar report on Raspberry Pi
A seminar report on Raspberry Pi
nipunmaster
 
16329032 generation-of-computers
16329032 generation-of-computers16329032 generation-of-computers
16329032 generation-of-computersInayat Ullah
 
History of the computer
History of the computerHistory of the computer
History of the computer
Samantha Lehman
 
Apple strategic audit
Apple strategic auditApple strategic audit
Apple strategic audit
Jeff Taylor (27,600+)
 
Kenneth d
Kenneth dKenneth d
14. mini revolution
14. mini revolution14. mini revolution
14. mini revolutionTim Histalk
 
L14 Software and AI
L14 Software and AIL14 Software and AI
L14 Software and AI
Ólafur Andri Ragnarsson
 
L17 Algorithms and AI
L17 Algorithms and AIL17 Algorithms and AI
L17 Algorithms and AI
Ólafur Andri Ragnarsson
 
Generation of computer (1978 1985)
Generation of computer (1978 1985)Generation of computer (1978 1985)
Generation of computer (1978 1985)
Enter Exit
 

Similar to Write a 7 page paper in APA format.The research paper should in.docx (20)

Modern CPUs
Modern CPUsModern CPUs
Modern CPUs
 
January 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docx
January 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docxJanuary 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docx
January 1, 2015. It is New Year’s Day and Virginia Rometty, IB.docx
 
Fourth Generation Computers
Fourth Generation ComputersFourth Generation Computers
Fourth Generation Computers
 
4th gen microprocessor
4th gen microprocessor4th gen microprocessor
4th gen microprocessor
 
Apple SWOT
Apple SWOTApple SWOT
Apple SWOT
 
Computers
ComputersComputers
Computers
 
Appendix a web
Appendix a webAppendix a web
Appendix a web
 
Appendix a web2
Appendix a web2Appendix a web2
Appendix a web2
 
Fourth Generation Computers.pptx
Fourth Generation Computers.pptxFourth Generation Computers.pptx
Fourth Generation Computers.pptx
 
A seminar report on Raspberry Pi
A seminar report on Raspberry PiA seminar report on Raspberry Pi
A seminar report on Raspberry Pi
 
16329032 generation-of-computers
16329032 generation-of-computers16329032 generation-of-computers
16329032 generation-of-computers
 
History of the computer
History of the computerHistory of the computer
History of the computer
 
Apple strategic audit
Apple strategic auditApple strategic audit
Apple strategic audit
 
Kenneth d
Kenneth dKenneth d
Kenneth d
 
HIStory 14
HIStory 14 HIStory 14
HIStory 14
 
14. mini revolution
14. mini revolution14. mini revolution
14. mini revolution
 
L14 Software and AI
L14 Software and AIL14 Software and AI
L14 Software and AI
 
L17 Algorithms and AI
L17 Algorithms and AIL17 Algorithms and AI
L17 Algorithms and AI
 
Generation of computer (1978 1985)
Generation of computer (1978 1985)Generation of computer (1978 1985)
Generation of computer (1978 1985)
 
Apple history
Apple historyApple history
Apple history
 

More from mayank272369

NEW YORK STATE It is important to identify and develop vario.docx
NEW YORK STATE It is important to identify and develop vario.docxNEW YORK STATE It is important to identify and develop vario.docx
NEW YORK STATE It is important to identify and develop vario.docx
mayank272369
 
Next, offer your perspective on transparency. In Chapter 3 of th.docx
Next, offer your perspective on transparency. In Chapter 3 of th.docxNext, offer your perspective on transparency. In Chapter 3 of th.docx
Next, offer your perspective on transparency. In Chapter 3 of th.docx
mayank272369
 
New research suggests that the m ost effective executives .docx
New research suggests that the m ost effective executives .docxNew research suggests that the m ost effective executives .docx
New research suggests that the m ost effective executives .docx
mayank272369
 
NewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docx
NewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docxNewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docx
NewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docx
mayank272369
 
Negotiation StylesWe negotiate multiple times every day in e.docx
Negotiation StylesWe negotiate multiple times every day in e.docxNegotiation StylesWe negotiate multiple times every day in e.docx
Negotiation StylesWe negotiate multiple times every day in e.docx
mayank272369
 
Neurological SystemThe nervous system is a collection of nerves .docx
Neurological SystemThe nervous system is a collection of nerves .docxNeurological SystemThe nervous system is a collection of nerves .docx
Neurological SystemThe nervous system is a collection of nerves .docx
mayank272369
 
Neuroleadership is an emerging trend in the field of management..docx
Neuroleadership is an emerging trend in the field of management..docxNeuroleadership is an emerging trend in the field of management..docx
Neuroleadership is an emerging trend in the field of management..docx
mayank272369
 
Network security A firewall is a network security device tha.docx
Network security A firewall is a network security device tha.docxNetwork security A firewall is a network security device tha.docx
Network security A firewall is a network security device tha.docx
mayank272369
 
Network Forensics Use the Internet or the Strayer Library to.docx
Network Forensics Use the Internet or the Strayer Library to.docxNetwork Forensics Use the Internet or the Strayer Library to.docx
Network Forensics Use the Internet or the Strayer Library to.docx
mayank272369
 
Negotiation Process in the International ArenaNegotiation is.docx
Negotiation Process in the International ArenaNegotiation is.docxNegotiation Process in the International ArenaNegotiation is.docx
Negotiation Process in the International ArenaNegotiation is.docx
mayank272369
 
Needs to be 150 word min. Perform a scholarly search (using Pu.docx
Needs to be 150 word min. Perform a scholarly search (using Pu.docxNeeds to be 150 word min. Perform a scholarly search (using Pu.docx
Needs to be 150 word min. Perform a scholarly search (using Pu.docx
mayank272369
 
Needing assistance with powerpoint presentation for Sociology in the.docx
Needing assistance with powerpoint presentation for Sociology in the.docxNeeding assistance with powerpoint presentation for Sociology in the.docx
Needing assistance with powerpoint presentation for Sociology in the.docx
mayank272369
 
Need to write essay on 1000 words about Guns and Crimes , in context.docx
Need to write essay on 1000 words about Guns and Crimes , in context.docxNeed to write essay on 1000 words about Guns and Crimes , in context.docx
Need to write essay on 1000 words about Guns and Crimes , in context.docx
mayank272369
 
Need Research Paper related to the course Related topic in the.docx
Need Research Paper related to the course Related topic in the.docxNeed Research Paper related to the course Related topic in the.docx
Need Research Paper related to the course Related topic in the.docx
mayank272369
 
Need it in about 12 hours. There are 3 docx file each one of.docx
Need it in about 12 hours. There are 3 docx file each one of.docxNeed it in about 12 hours. There are 3 docx file each one of.docx
Need it in about 12 hours. There are 3 docx file each one of.docx
mayank272369
 
Need plagiarism very important Select one type of cryptography o.docx
Need plagiarism very important Select one type of cryptography o.docxNeed plagiarism very important Select one type of cryptography o.docx
Need plagiarism very important Select one type of cryptography o.docx
mayank272369
 
Need the below with in 24 hours.Provide 2 references,500 words.docx
Need the below with in 24 hours.Provide 2 references,500 words.docxNeed the below with in 24 hours.Provide 2 references,500 words.docx
Need the below with in 24 hours.Provide 2 references,500 words.docx
mayank272369
 
Need it within 12-14 hours of time.One paragraph with 300 words .docx
Need it within 12-14 hours of time.One paragraph with 300 words .docxNeed it within 12-14 hours of time.One paragraph with 300 words .docx
Need it within 12-14 hours of time.One paragraph with 300 words .docx
mayank272369
 
Need it to be 300 words. Two paragraphs only. What would you co.docx
Need it to be 300 words. Two paragraphs only.  What would you co.docxNeed it to be 300 words. Two paragraphs only.  What would you co.docx
Need it to be 300 words. Two paragraphs only. What would you co.docx
mayank272369
 
Need it for tomorrow morning!!!!For your synthesis essay, yo.docx
Need it for tomorrow morning!!!!For your synthesis essay, yo.docxNeed it for tomorrow morning!!!!For your synthesis essay, yo.docx
Need it for tomorrow morning!!!!For your synthesis essay, yo.docx
mayank272369
 

More from mayank272369 (20)

NEW YORK STATE It is important to identify and develop vario.docx
NEW YORK STATE It is important to identify and develop vario.docxNEW YORK STATE It is important to identify and develop vario.docx
NEW YORK STATE It is important to identify and develop vario.docx
 
Next, offer your perspective on transparency. In Chapter 3 of th.docx
Next, offer your perspective on transparency. In Chapter 3 of th.docxNext, offer your perspective on transparency. In Chapter 3 of th.docx
Next, offer your perspective on transparency. In Chapter 3 of th.docx
 
New research suggests that the m ost effective executives .docx
New research suggests that the m ost effective executives .docxNew research suggests that the m ost effective executives .docx
New research suggests that the m ost effective executives .docx
 
NewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docx
NewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docxNewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docx
NewFCFF2StageTwo-Stage FCFF Discount ModelThis model is designed t.docx
 
Negotiation StylesWe negotiate multiple times every day in e.docx
Negotiation StylesWe negotiate multiple times every day in e.docxNegotiation StylesWe negotiate multiple times every day in e.docx
Negotiation StylesWe negotiate multiple times every day in e.docx
 
Neurological SystemThe nervous system is a collection of nerves .docx
Neurological SystemThe nervous system is a collection of nerves .docxNeurological SystemThe nervous system is a collection of nerves .docx
Neurological SystemThe nervous system is a collection of nerves .docx
 
Neuroleadership is an emerging trend in the field of management..docx
Neuroleadership is an emerging trend in the field of management..docxNeuroleadership is an emerging trend in the field of management..docx
Neuroleadership is an emerging trend in the field of management..docx
 
Network security A firewall is a network security device tha.docx
Network security A firewall is a network security device tha.docxNetwork security A firewall is a network security device tha.docx
Network security A firewall is a network security device tha.docx
 
Network Forensics Use the Internet or the Strayer Library to.docx
Network Forensics Use the Internet or the Strayer Library to.docxNetwork Forensics Use the Internet or the Strayer Library to.docx
Network Forensics Use the Internet or the Strayer Library to.docx
 
Negotiation Process in the International ArenaNegotiation is.docx
Negotiation Process in the International ArenaNegotiation is.docxNegotiation Process in the International ArenaNegotiation is.docx
Negotiation Process in the International ArenaNegotiation is.docx
 
Needs to be 150 word min. Perform a scholarly search (using Pu.docx
Needs to be 150 word min. Perform a scholarly search (using Pu.docxNeeds to be 150 word min. Perform a scholarly search (using Pu.docx
Needs to be 150 word min. Perform a scholarly search (using Pu.docx
 
Needing assistance with powerpoint presentation for Sociology in the.docx
Needing assistance with powerpoint presentation for Sociology in the.docxNeeding assistance with powerpoint presentation for Sociology in the.docx
Needing assistance with powerpoint presentation for Sociology in the.docx
 
Need to write essay on 1000 words about Guns and Crimes , in context.docx
Need to write essay on 1000 words about Guns and Crimes , in context.docxNeed to write essay on 1000 words about Guns and Crimes , in context.docx
Need to write essay on 1000 words about Guns and Crimes , in context.docx
 
Need Research Paper related to the course Related topic in the.docx
Need Research Paper related to the course Related topic in the.docxNeed Research Paper related to the course Related topic in the.docx
Need Research Paper related to the course Related topic in the.docx
 
Need it in about 12 hours. There are 3 docx file each one of.docx
Need it in about 12 hours. There are 3 docx file each one of.docxNeed it in about 12 hours. There are 3 docx file each one of.docx
Need it in about 12 hours. There are 3 docx file each one of.docx
 
Need plagiarism very important Select one type of cryptography o.docx
Need plagiarism very important Select one type of cryptography o.docxNeed plagiarism very important Select one type of cryptography o.docx
Need plagiarism very important Select one type of cryptography o.docx
 
Need the below with in 24 hours.Provide 2 references,500 words.docx
Need the below with in 24 hours.Provide 2 references,500 words.docxNeed the below with in 24 hours.Provide 2 references,500 words.docx
Need the below with in 24 hours.Provide 2 references,500 words.docx
 
Need it within 12-14 hours of time.One paragraph with 300 words .docx
Need it within 12-14 hours of time.One paragraph with 300 words .docxNeed it within 12-14 hours of time.One paragraph with 300 words .docx
Need it within 12-14 hours of time.One paragraph with 300 words .docx
 
Need it to be 300 words. Two paragraphs only. What would you co.docx
Need it to be 300 words. Two paragraphs only.  What would you co.docxNeed it to be 300 words. Two paragraphs only.  What would you co.docx
Need it to be 300 words. Two paragraphs only. What would you co.docx
 
Need it for tomorrow morning!!!!For your synthesis essay, yo.docx
Need it for tomorrow morning!!!!For your synthesis essay, yo.docxNeed it for tomorrow morning!!!!For your synthesis essay, yo.docx
Need it for tomorrow morning!!!!For your synthesis essay, yo.docx
 

Recently uploaded

kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
SriSurya50
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
amberjdewit93
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Write a 7 page paper in APA format.The research paper should in.docx

  • 1. Write a 7 page paper in APA format. The research paper should include the following sections. Discuss the competitors, future, and innovations with computing. Using the outline below: Cover page Introduction – (Thesis statement and Purpose of paper) Background – Background and History on the concept Discussion – Discuss current issues, innovation, and future use. Support the topic with any necessary sources. Be sure to include in-text citations. Conclusion – Summary of main points Theory in Action: IBM and the Attack of the Clones In 1980, IBM was in a hurry to introduce a personal computer. When personal computers first began to emerge at the end of the 1970s, most of the major computer manufacturers considered it no more than a peculiar product for a hobbyist market. The idea that individuals would want personal computers on their desks seemed ludicrous. However, as total U.S. personal computer sales reached $1 billion, IBM began to worry that the personal computer market could actually turn out to be a significant computer market in which IBM had no share. To bring a personal computer to market quickly, IBM decided to use many off-the-shelf components from other vendors, including Intel's 8088 microprocessor and Microsoft's software. However, IBM was not worried about imitators because IBM's proprietary basic input/output system (BIOS), the computer code that linked the computer's hardware to its software, was protected by copyright. While other firms could copy the BIOS code, doing so would violate IBM's copyright and incur the legendary wrath of IBM's legal team. However, getting around IBM's copyright turned out not to be difficult. Copyright protected the written
  • 2. lines of code, but not the functions those codes produced. Compaq was able to reverse-engineer the BIOS in a matter of months without violating IBM's copyright. First, a team of Compaq programmers documented every function the IBM computer would perform in response to a given command, without recording the code that performed the function. This list of functions was then given to another team of “virgin” programmers (programmers who were able to prove that they had never been exposed to IBM's BIOS code).a These programmers went through the list of functions and wrote code to create identical functions. The result was a new BIOS that acted just like an IBM BIOS but did not violate its copyright. Compaq sold a record-breaking 47,000 IBM-compatible computers in its first year, and other clones were quick to follow. a R. Cringely, Accidental Empires (New York: HarperCollins, 1992). Writ e a 7 page paper in APA format. The research paper should include the following sections. Discuss the competitors, future, and innovations with computing. Using the outline below: Cover page Introduction –
  • 3. (Thesis statement and Purpose of paper) Background – Background and History on the concept Discussion – Discuss current issues, innovation, and future use. Support the topic with any necessary sources. Be sure to include in - text citations. Conclusion – Summary of main points Theory in Action : IBM and the Attack of the Clones In 1980, IBM was in a hurry to introduce a personal computer. When personal computers first began to emerge at the end of the 1970s, most of the major computer manufacturers considered it
  • 4. no more than a peculiar product for a hobbyist market. The idea that individuals would want personal computers on their desks seemed ludicrous. However, as tota l U.S. personal computer sales reached $1 billion, IBM began to worry that the personal computer market could actually turn out to be a significant computer market in which IBM had no share. To bring a personal computer to market quickly, IBM decided to us e many off - the - shelf components from other vendors, including Intel's 8088 microprocessor and Microsoft's software. However, IBM was not worried about imitators because IBM's proprietary basic input/output system (BIOS), the computer code that linked the c omputer's hardware to its software, was protected by copyright. While other firms could copy the BIOS code, doing so would violate IBM's copyright and incur the legendary wrath of IBM's legal team. However, getting around IBM's copyright turned out not to be difficult. Copyright protected the written lines of code, but not the functions those Write a 7 page paper in APA format. The research paper should include the following sections. Discuss the competitors, future, and innovations with computing. Using the outline below: Cover page Introduction – (Thesis statement and Purpose of paper) Background – Background and History on the concept
  • 5. Discussion – Discuss current issues, innovation, and future use. Support the topic with any necessary sources. Be sure to include in-text citations. Conclusion – Summary of main points Theory in Action: IBM and the Attack of the Clones In 1980, IBM was in a hurry to introduce a personal computer. When personal computers first began to emerge at the end of the 1970s, most of the major computer manufacturers considered it no more than a peculiar product for a hobbyist market. The idea that individuals would want personal computers on their desks seemed ludicrous. However, as total U.S. personal computer sales reached $1 billion, IBM began to worry that the personal computer market could actually turn out to be a significant computer market in which IBM had no share. To bring a personal computer to market quickly, IBM decided to use many off-the- shelf components from other vendors, including Intel's 8088 microprocessor and Microsoft's software. However, IBM was not worried about imitators because IBM's proprietary basic input/output system (BIOS), the computer code that linked the computer's hardware to its software, was protected by copyright. While other firms could copy the BIOS code, doing so would violate IBM's copyright and incur the legendary wrath of IBM's legal team. However, getting around IBM's copyright turned out not to be difficult. Copyright protected the written lines of code, but not the functions those