SEARCH RESULTS

YOU WERE LOOKING FOR :19 Computer Monitiors Compared

Essays 121 - 150

Computer Science Majors and Computers

Core computer curriculum is discussed in six pages as it pertains to a computer scienc major with an emphasis upon getting back to...

Criminal Justice and Computers

In five pages the criminal justice system is examined in terms of the significant impact of computers with FBI investigations of o...

Entertainment and Computers

In six pages the entertainment industry is examined with the effects of the personal computer and how computers can be utilized as...

Digital Video or Versatile Disks vs. Compact Discs

Computer enhanced digital techology is the focus of this paper consisting of four pages in which DVDs and CDs are contrasted and c...

Medical Technology and Computers

In seven pages medicine and its computer history are considered with such concepts as telemedicine, computer aided surgery, and 'v...

Tactics to Minimize Computer Crimes

'Cracking' and 'hacking' are among the topics discussed in this examination of computer systems and unauthorized access consisting...

Nursing Student Instruction, Lecture Method or Computer Assisted Learning

In forty pages the instruction of nursing students is considered in an examination of computer assisted learning and lecture metho...

Classrooms and Computers

In ten pages utilizing computers in a classroom setting is discussed in terms of its advantages and the ways in which computers ca...

Human Intelligence versus Computer Intelligence

In an essay consisting of three pages an article that discusses human and computer intelligence distinctions is analyzed with the ...

Direct and Indirect Channels of Marketing and Computers

In fifteen pages Apple, Compaq, Dell, and Gateway 2000 computer manufactures are featured in this report of computer marketing cha...

An Outline for an Apple Computers Analysis

In five pages this writer describes an Apple Computers' case study outline that provides an effective method of analysis. Three s...

Education and Computer Uses

In five pages the evolution of computers in the field of education is traced to the 1944 MARK 1 installation as discussed in the J...

Issues of Human and Computer Interface

In twelve pages this paper considers human and computer interface in a discussion of cognitive problems that have yet to be addres...

India as a Market for PC Sales

In seven pages this research paper discusses computer sales in a consideration of India's personal computer market. Six sources a...

Proposed School Board Plan for Children Using Computers

In eight pages this paper discusses a school board proposal for the use of computers for all children in a school district regardl...

American Leadership as Personified by Steve Jobs and Virginia Henderson

CP/M, which was shortly to be succeeded by MS/DOS (Alsop 188). The Macintosh operating system offered an icon-driven system that a...

Saudi Arabia and Apple Computers

of extremely successful computers, which brought its U.S. market share back up to 10%. Overseas, it has maintained dominance, howe...

Distribution and Dell Computer

In five pages the direct sales methods of Dell Computer are examined in terms of its revolutionary impact upon the personal comput...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Ireland and China's ICT Industries

the same time, when choosing an environment in which to do business, it pays to look at the industries in both nations as well as ...

Libraries and Censorship Filters

content specifically set out in the CIPA statue;... 2. Certain broad categories of content--among them journalistic, medical, educ...

Marketing Strategies Dell vs. Apple Mac

to the overhead luggage compartment and bringing down his G4 iBook, then, Troyer pulls his G4 iBook from under the seat (Lipperts,...

Safeguards and Penalties for Improper Use of Data and U.S. Law

to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...

Procedure and Criminal Law II

The definition of felony murder is that it is a killing that is unintentional, occurring "during the commission or attempted commi...

Classrooms, Computers, and the Educational Tool Known as Technology

tools currently in use in the classroom and in the home. In just the last decade some $9 billion has been spent in U.S. schools t...

LOVE Computer Virus Attack of 2000

in the emails were exactly the same. Additionally, the emails were coming from software developers in the office, five emails in a...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Ideal Computer Building

which has been chosen is one that is well ventilated and also has an integral fan and power supply. The provision of a fire wall U...

Computer Hardware and Peripherals: The Evolution of Learning

use computers in our daily lives for both work and for play many of us are not as well educated in these machines as we maybe ough...