• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Mike Basset and Bill Gates had been friends since high school.

Extracts from this document...

Introduction

Mike Basset and Bill Gates had been friends since high school. They'd competed for 1st place all the time. They'd spent hour's together writing computer programs even before people heard in programming. They grew up together and even went to university and were joint top students. They both went in the programming business and soon each opened their own computer company Bill named his 'Microsoft' and Mike called it 'Compufriek'. Bill was very successful and was very famous his products all across the globe he was well know for Windows and Microsoft office. On the other hand Mike was very good but only known in the United States but still lacking behind Bill. They both got married and had children. Mike's wife Jenny was very jealous of Marry Mrs. Gates shoe always used to talk about how successful her husband is and the contacts he makes with Difrent Company's across the world. Mike is also fed up his only ambition from when he was a boy was to run the best computer company and here his best friend his standing in his way. One day Mr. & Mrs. Gates invited the Bassets for a barbecue in their new mansion. It was exactly noon when the Bassets arrived at the Gates. ...read more.

Middle

she says quietly. "You want me to betray my best friend. No forget about it" he replied angrily and went to bed. The next day he gets up and goes on his computer to do a bit of work. He kept working on his hacking program until it was finished. "Honey" he called. "I've finished my program." Jenny walks in and congratulates him "Well no you need to test it!" she said. "Test it?" he replied. "Who on?" "I can't try it on anyone its illegal" "Well test it on Bills I am sure he wont mind, you are his best friend" she tells him "Just see if it works properly and the switch it off" "Well ok" he replies and starts to test it he started to input and few numbers and letters and the put search. Bills name came up on the screen. He accessed his computer. "Look what's that?" asked Jenny "Oh it will be some of his files" "I'll close it now I know it works" he said "No" Jenny said, "just have a quick look, it won't hurt" He sat there looking at Bill Gates files. His ambition took control of him. He spotted a file named 'big plan'. ...read more.

Conclusion

He couldn't go out and show his face to the public they would just give him credit for the new program and that would make things worse. One week later something very unexpected happened when Mike was at home. The F.B.I came knocking at his door. "Can I help you?" he asked "Would you please come with us?" they replied. "What seems to be the matter?" Mike asked knowing he was caught. "You are under arrest for hacking into someone's computer and steeling ideas and programs." They replied in a disappointed tone of voice. At that moment he knew his life was over his ambition just destroyed his life. He went quietly with them. As stepping out of their car and going towards the police station he says Bill. "I'm sorry," he said to him. "From all the people I didn't want to think it was you" he replied in a disappointed way. Mike walked off with the agents and into the station. He was sentenced to 15 years in prison. All of the money from the program went to Bill Gates and he got all the credit. He managed to by back all his company and start dominating the computer world once again. Mike was finished he would never write another computer program again. Bill's life returned to normal except for one thing he had no best friend beside him. The End ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computing Project

    to what I have written above ADOMembers ['surname']:=lbledSurname.Text; ADOMembers ['house number']:=lbledhousenumber.Text; ADOMembers ['street name']:=lbledstreetname.Text; ADOMembers ['Town']:=lbledtown.Text; ADOMembers ['Tel number']:=LbledTelno.Text; Adomembers ['Date Joined']:=date; ADOMembers ['Post Code']:=lbledpostcode.Text; ADOMembers ['Additional Notes']:=lbledaddnotes.Text; showmessage ('Member Has Been Added'); adomembers.post; end; end; end; procedure TFmRegAMem.Button1Click(Sender: TObject); begin fmmenu.show;//show this form end; end.

  2. Bill Gates Biography

    Bill first made excel for Apple. (Dickson, 63) Excel is now on tons of millions of computers worldwide. Apple also let Microsoft use Apple's OS while they were developing Windows 1.0, that later turned out to be a huge success, and a huge loss for Apple.

  1. Logic and Logic Gates

    [M2] 3) Describe the difference between astable and bistable flip-flops using appropriate diagrams. [M4] 4) Build complex logic circuits from arrays of simple logic circuits to: a) Use Half-Adders and further logic gates to build a Full Adder b)build a logic circuit including Full Adders to add together the contents of two eight-bit registers.

  2. Computing Project

    11457848 Sean Higgins 125 Buckingham Avenue, Bath, BA15SS 0015 8794649 12147894 Harry Atkinson 32A Church Street, Manchester, MA326TR 0248 6497466 21347418 Katy Buckland 36 Burleigh Road, Loughborough, LE115DS 0150 9296797 21547854 Lyne Payne 32 Oxford Road, Cambridge, CM115KP 0117 3526594 22174895 Richard Talver 6 Stewart Drive, Manchester, MN148SK 0178 2649849

  1. Flexible Architectures in Communication Security Application

    The setup code processes the key to create various SBOX's and key-based permutations required by the cipher kernel. In addition, many of the algorithms pre-compute lookup tables (based on the key) that speed processing in the cipher kernel. The encryption and decryption kernels process one block of data.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Implementation (12 marks) The following marks are awarded for the implementation of the prototype solution. 10 - 12 The candidate has fully implemented the design unaided. ( A fully working system has been completed in an efficient manner following the time plan.

  1. Creating a computer system for Wooten Basset Rugby Club

    Money management is also a problem. Fees used to pay math officials are deducted form the fees paid by players. This is organised by the coaches, however often players miss this payment and the referee's payment is short. Yet with at least 15 players playing in every match records of owes money are not kept and this information is simply forgotten.

  2. Definition-nature of the problem solved - Car Mechanic business

    the near future based on the amount of work needed and also the space left available. The owner told me that he estimates space but it never poses too much of a problem because of not keeping individual vehicles longer than a day.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work