SEARCH RESULTS

YOU WERE LOOKING FOR :computer and technology

Essays 601 - 630

Need a Brand New Custom Essay Now?  click here
Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

India, Computers, and Girls

girls will continue to be stricken from the progress of modern technology. School girls can only gain the requisite confidence to...

Morocco's CasaComputer Marketing

In twenty seven pages this paper presents a plan for Morocco marketing of computers that are made in the United States in a consid...

Hong Kong Presence of Dell Computers

In twenty pages this paper considers how Dell Computers can develop a strong market presence in Hong Kong, where the economy is ai...

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...

Women in Computers

This paper consists of six pages and discusses female pioneers in the field of computers in a consideration of Grace Murray Hopper...

Compaq Computer and Supply Chain Management

In six pages this paper examines Compaq Computers in a consideration of the company's supply chain management. Seven sources are ...

Comparative Advantage of Dell Computer

In six pages the personal computer industry and its changes are examined in the responses of corporate giants, Gateway, Compaq, an...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Disabled Computer User Software Programs and Assistive Devices

In 7 pages this paper examines the software programs that make computers more user friendly for disabled individuals in a consider...

Workplace Computer Training and Digital Diplomas

low cost, high speed Internet access, has made virtual reality virtually a reality. The dual office-classroom described above exe...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Computer Tools and Inappropriate Prescribing for the Elderly

The incidence of inappropriate medication prescriptions issued to elderly individuals is estimated to be between 12 and 40 percent...

Positive and Negative Aspects of Computers

and dilemmas of computerization really work out for large numbers of people under an immense variety of social and technical condi...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Ethics of Global Computer Laws

Extending that metaphor one step further, Katsch (1995) comments that the invasion of legal spaces by cyberspace, however, goes be...

Computer Domains, Software, and Selection Critera

Computer domains are the subject of this paper consisting of two pages along with the various types of equipment required in order...

Channels of Direct and Indirect PC Marketing

In a report consisting of fifteen pages this paper evaluates the pros and cons of the direct and indirect channels of marketing em...

Individual Privacy and Computers

for consumption by the government, organizations, companies and a whole host of other mediums where computers are utilized to tran...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...