SEARCH RESULTS

YOU WERE LOOKING FOR :A Computer History

Essays 841 - 870

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Issues of Computer Security

Carroll (1995) makes the point that whilst it is possible to establish a reasonable amount of security on the Internet, the way in...

Computers and Ordered Message Delivery

adds to the overhead of the messaging system. "The primary cause for message loss is input buffer overflow, which can be avoided ...

Elementary Classrooms, Technology, and Reading

thinking proficiency, encourage the use of writing skills to communicate with others, and improve research capabilities," says Wal...

Solectron Corporation and Dell Computer Corporation

of services provided (Cutcliffe, 1996). At the same time, the brand that is outsourcing to Solectron does not want the buyer to kn...

Computer Systems' Client Servers and Mainframes

one if favoured currently, does not mean that the other will disappear, and as such mainframes are still a very valid choice. Ther...

United Kingdom and Computer Crime

censorship, where there has been increased realisation and commitment to deal with the type of information that is on the internet...

Government Regulation and Computers

looking into various forms of regulation concerning taxation and prohibition based on pornography laws. Also, pornographic materia...

Russian Society and the Effect of Computers

as rapidly as was expected. There isnt enough interest right now. That could be changing, however, as the last few months have s...

Personal Computer Industry of the United States

is "no longer a technology business. You dont need a team of engineers to build a PC today" Jerre L. Stead of the largest distrib...

Execution of Computer Software

different operating systems have completely different architecture, then in looking at how the language a programme is written in,...

Current Trends Regarding Network Security Issues

home office or to transfer sensitive documents to the boss. It was found that others would enter the home offices portals - hacker...

Electrical Engineer's Duties

information back to military databases and management information systems are known in the industry as Very Small Aperture Termina...

Computer Information Systems Industry Employment

in using it, and why? Seemingly any company wishing to do intense data scanning on consumers will be able to justify to their own...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

A Revised Computer System and the Problems of Audio Visual Corporation

cut down on extra time and money the company did not need to be spending. In order to eliminate these wasted resources, Audio Vis...

Leasing Information Technology Equipment Benefits and Costs

of limited resources and a need to maximise the resources that are available leasing can also be seen as providing some benefits. ...

Comparison Between Compaq, Gateway, and Dell

* Speed = 1 GHz * RAM = 192 MB. * Hard Drive = 20 GB * Diagonal Screen sizes 15 inches * Installed Operating System = Windows Mill...

Performance and Outlook of Apple Computers

a friend had created the silicon chips on which the Apple Computer would be based, but they at first had no idea of how the chip c...

Computers and Reading Skill Improvements

in the classroom are beneficial to improving reading skills. The paper also provides a brief section which discusses two particula...

Overview of Computer Aided Software Engineering

a total automatic programing environment is still by and large rather illusive, several recent findings bring the fantasy closer ...