SEARCH RESULTS

YOU WERE LOOKING FOR :30 user login

Essays 181 - 210

Need a Brand New Custom Essay Now?  click here
Standards For End Users

The ISO 9241 standard defines usability thusly: "The extent to which a product can be used by specified users to achieve specified...

The World is Getting Fatter

Obesity is a global issue that is nearly an epidemic. The CDC reported that over the last 30 years, obesity has more than doubled ...

XBox Users and Buyers

event organiser set up promotion for the X-box with games such as Crash Nitrocart as well as the Simpsons Hit and Miss, These were...

Literature Review of Overdose Effects of Safe Injection Houses for Street Drug Users

not many studies have really dealt in such a singular issue, but rather, lump potential drug overdose as one of the many problems ...

'Collegue' by Datatel and User Acceptance

The results, according to Stoik (2001), were that the "ability to systematically track student progress and intervene appropriatel...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Social Work and Service User Rights

experience, in such a way as to determine the rules that ought to govern human conduct, the values worth pursuing and the characte...

Health Outcomes in the Inner Cities

in 2001 (Griggs and Bazie, 2002). The median household income dropped across the board, including all racial-ethnic groups with t...

Adaptable Intellegence User Interfaces and Human Computer Communications

entertainment gained tremendous momentum over the next five years and the number of users increased dramatically. By the late 199...

Users and Multiple Domains

In two pages this paper examines multiple domain utilization and the importance of providing easy employee access so that informat...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Sisson Systems Case Study

seen as fair and legal for warning and then terminating contracts of employment with non-productive employees. 1. Background Sis...

Risk Management Function in Corporate and Military Settings

Management 18 Lessons From Dow Chemical 22 Method of Analysis 23 Modeling Security Risk 24 Results of Analysis 26 Conclusion and R...

SEBD Students; Equality of Recognition

together in a SEBD pupil can create many barriers for the social and educational development of the student, but when they are dea...

Using Utilization Management to Determine Courses of Action in a Canadian Hospital

MIS Guidelines? Certainly the publication addresses resource utilization, but does it specifically address creation of a new unit...

Computer-Based Instruction/Effect on Reading Achievement

p. 7 Chapter 2--Review of Related Literature... p. 7 Articles summarizing research ............ p. 8 Studies Students w/langua...

Users of Drugs and Alcohol and Quitting Smoking

et al, 2005). However, smokers are not limited in their addition, those who are addicted to other substances, such as alcohol. For...

Armenia, Genocide & Meaning

applicable to the overall topic of genocide. Therefore, the following examination of the Armenian Genocide, concentrating on the h...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Analysis of FedEx

Sales (FedEx, 2007). During the operations of this firm Smith noted problems delivering any packages within a couple of days, the ...

Obesity in Adults

negative health impacts are felt. This means that there is a lag in the conditions as well as the associated costs. The short term...

Pfizer

and profits. The grand strategy is one of innovation and marketing. The company seeks to continually develop new products manag...

Learning Theories - Emphasis On Adult Learning Theories

transformative experience when the conditions are such that the learner is involved in reflection. This essay discusses the lear...

Servant Leadership

the kingdom of heaven and the Father in heaven and he also emphasizes Jesus lineage from David (NIV, p. 1433). Matthew does not li...

The New Chrysler LLC - An Analysis

silent transmissions, semi-automatic transmissions, different wheelbases, power steering, air bags, the first minivans, the first ...

Why Study Computer Crime?

damage caused by incidence of computer crime. This includes virus attacks, spam, worms, denial of service (DOS) attacks or other ...

Analysis : Advertising For iPhone

brand itself has always connoted "nonconformity, liberty and creativity." This is a subculture that has a certain mindset, traditi...

IT's Quality Culture

goals" (p. 41). The fact is not news to anyone working in IT project management, but its magnitude may be. At a time when busine...

Ecstasy Use As A Party Drug: Cause And Effect

dosage will make them increase this aphrodisiac sensation will only experience acute nausea, seizures and eventual unconsciousness...

The Three Strikes Law of California

Nine pages and eight sources. This paper provides an overview of the Three Strikes Statute in California. This paper considers t...