Essays 751 - 780
This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...
The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...
This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...
This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...
Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...
In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....
This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...
This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...
In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...
In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...
This 5 page paper gives an explanation of reading electronic text versus reading hard copy text. This paper includes studies about...
Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...
There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...
The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...
Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...
film, it takes many thousands of frames to make even a few minutes of time in the finished movie. The most famous example of thi...
Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...
In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...
In this paper consisting of twenty one pages this paper examines the banking industry in an overview of the implications of the Ye...
The problem of panic is directly linked to the perceptions and actions of a number of Y2K alarmists, who have argued that the gove...
This paper examines the various computer problems associated with the date change to January 1, 2000 in eight pages. Eight source...
This paper examines the many computer problems that can result from the Y2K bug upon the year 2000 in five pages. Three sources a...
mayhem in the world. Most computer programs have a two-digit date field, thus when the year 1998 is keyed in, the computer reads o...
has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...
isolate the children from each other but since few classrooms have one computer per child, the opposite has happened. Children clu...
statements. Furthermore, Chinese competitors of Dell have somewhat of a singular advantage, that being backing from the Ch...
great extent, the need for technical patches will still remain pertinent to meeting, if not deflecting, the growth of hacking crim...
be accessed from almost any computer. These are run through a web browser or equivalent type of program. Probably the two best-kno...
patent as the process was in the ROM. If the patent application was a development that included a computer programme but was not a...
This is where interactive technology will help to ease such a burden (Block, Gambrell and Pressley, 2004). Numerous studies...