SEARCH RESULTS

YOU WERE LOOKING FOR :Computer

Essays 181 - 210

Need a Brand New Custom Essay Now?  click here
Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Apple Computers and the effects of Greenwashing

there to collect litter or to hear free concerts (1995). But Earth Day grew into something of a circus-like atmosphere. So when Ea...

Computers or Books in Education

The book is incredibly low-maintenance, never requiring that it be rebooted or upgraded. Books can travel with the individual and...

Legality of Computer Ethics

In a paper of five pages, the writer looks at legal issues of computing. Ethics and security issues are examined as well. Paper us...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Employers Monitoring Computer Use

There is no single comprehensive law that covers employee privacy rights or what types of privacy an employee should expect. Due t...

Computer History and Their Impact on Society

This research paper offers a comprehensive overview of the development of computers. Then, the writer discusses the impact that co...

The Impact of the Internet on Communication - Collective Work and Journalism

This paper is written in two parts. The first part of the paper assessed the way that the internet has facilitated collective wor...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

OVERCOMING BARRIERS TO CLASSROOM TECHNOLOGY IMPLEMENTATION

Discusses potential barriers to classroom technology implementation, and was to overcome those issues. There are 4 sources listed ...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

Elementary and High School Virtual Computer Field Trips

of Blooms taxonomy had the assignment not limited their access to the Internet. These outcomes were not uniform for all ind...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Digital Age and the Effects of Privacy Threats

to information management, it has also ushered in many concerns about information privacy. Indeed, individual expectations of pri...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Marketing Strategies of Apple Mac Computers

differently if they hope to recapture a greater market share in the PC market. CHAPTER 1: INTRODUCTION Apple Computer Inc. and M...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Mission Critical Data Personal Computer Environment Storage

control still (and will continue to) include management of security, maintenance and backup of data. These can all be summarized w...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...