SEARCH RESULTS

YOU WERE LOOKING FOR :65/65 user login

Essays 61 - 90

Need a Brand New Custom Essay Now?  click here
Comparison Between the iPhone and Google’s Android Operating Systems

different functionality. Furthermore, if one versions of Android has a bug there may be a requirement to wait for the developer to...

The Facilitation of Human Machine Interaction

the art training services for different types of firms, smaller companies do as well. User Solutions is a firm that provides "use...

The Effects of Drug Use

younger users, however, more frequently than it does older users. Some 2.8 percent of adults between eighteen and twenty-six year...

Is An Improved Conceptual Framework Is Likely To Enhance The Capacity Of Users To Make Sound Financial Allocation Decisions?

scenarios to those mentioned above are to be avoided and increased clarity is to be achieved. However, it may be argued that many ...

Google's Acquisition Of YouTube: Ethical Considerations of Content

others? Is the decision to remove offensive or illegal material only after receiving takedown requests a legitimate way to quickl...

Choosing an HR Information System

product will not be of value unless intended users know how to use it and how to gain the greatest benefit from it. Likely the be...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Microsoft Relationship Strategies

customers by limiting exposure to competition, and developing Microsoft as the default preference to easy access to the product. ...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Standards For End Users

The ISO 9241 standard defines usability thusly: "The extent to which a product can be used by specified users to achieve specified...

Deterring Young People from Committing Crime

This 3 page paper gives an overview of general deterrence theory and how is it not useful in preventing young drug users from comm...

E-COMMERCE TRUST IN DEVELOPED COUNTRIES: A LITERATURE REVIEW

(E-commerce). Security is hugely important when discussing e-commerce, because security is a huge part of trust. When it comes to ...

Illicit Drug Users and Reality Therapy

Our society is facing a very formidable enemy when it comes to substance abuse. Individuals can be addicted to alcohol, illicit...

The Growth and Evolution of Blogs and E-Learning Resources

Both blogs and e-learning resources have increased on Internet over the past few years. The writer looks at these two trends seen...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Information Access and Computer Science

In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into ...

Internet External Regulations

This paper discusses the problems associated with regulating the Internet in 14 pages with individual users, ISP, national and glo...

IRS, IT, and Government Reinvention

truly influence organizational performance? How essential is good leadership in relation to the performance of the group as a who...

Estee Lauder's Eye Cream and Buyer Behavior

an interview with people who have used the product. The paper then discusses how the product meets the needs and desires of consum...

Function and Form as They Involve Graphic User Interface

In six pages computer systems are considered in a discussion of graphic user interface function and form. Four sources are cited ...

Charter One Bank's and Bank of America's Online Banking

Current Business Focus As stated, Bank of America and Charter One Bank pursue very...

Web Development - Trends

case is one on which the organization needs to spend none of its precious financial resources. At the same time, there are ...

Disk Quota Establishment and Maintenance

space, however. Allowing users to keep email until it reaches a certain amount of storage space may be meaningless to them. What...

Examination of 'The Wife of Bath and the Mediation of Privitee' and Essay Response

In the end of the essay the author notes, "She expropriates herself: she makes of herself a sign, she publishes herself, as if she...

American Universities, Colleges, Drug Abuse and Effects

their responsibilities. For example, the marriage between alcohol consumption and college life have long been accepted as the nor...

Student Case Study on Systems Development

requires a different access level, with the ability to process data to produce the final results, bringing the different results t...

Architect and 'Humanist' Charles Willard Moore

In five pages the 'user friendly' characteristics of Moore's house and building design are the central focus of this paper on the ...

Young Users of the Internet and Possible Dangers

In four pages this research paper discusses younger Internet users in a consideration of the positive and negative aspects of onli...

Overview of Machine Language and Modern Programming Language Generations

In twelve pages this paper examines how programming language has evolved from the 1st to 5th generation and the machine language i...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...