SEARCH RESULTS

YOU WERE LOOKING FOR :APPLE COMPUTER INC AN ANALYSIS

Essays 991 - 1020

Twenty First Century US Army

In eight pages this essay examines the application of computer technology to the twenty first century American Army. Five sources...

Protocols of the Current and Next Generation

In ten pages computer networking is examined in terms of an overview of current and next generation protocols and a comparative ev...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Computer Industry Contributions of Seymour Cray

In eight pages supercomputer 'father' Seymour Cray is discusses in an examination of his computer industry contributions. Seven s...

The Development and History of Artificial Intelligence

and mathematicians. The conference took place in 1956 at Dartmouth College(Shipley 64). From that point forward the concept of art...

Can Computers Lie?

The Human Brain Descartes argued that the mind is an entirely separate substance from the body because he can "think" of...

Government Branches and Computer Industry Alliances

In five pages the significance of government and computer industry alliances is discussed with such results considered as software...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

Contemporary Educational Profession Issues

In twenty five pages this research paper discusses various teaching issues such as liability for educators, technology, computers,...

Music Instruction and the Use of Technology

the extent of that role and exactly what it should be is still a matter for conjecture. For example, Garvin (1994) believes that ...

Twenty First Century Computer Counseling

In nine pages this research paper discusses therapy, counseling, and how computers are being used with a consideration of such pra...

HIV Youth and Computers

In five pages this report discusses computer technology as it pertains to youth afflicted with HIV in terms of applications and po...

Teaching Math by Computer and Standard Textbook Math Education in Terms of Benefits

In a study consisting of ten pages the hypothesis that teaching math by computer generates significantly higher learning outcomes ...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Law and Computer Crime

In five pages the federal and state laws created to prevent the increasing instances of computer crime are discussed. Five source...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Comparison of UNIX, OS2, and Windows Computer Operating Systems

In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a c...

Choices in Computer Software

In six pages Oracle's Oracle 8 and Access 97 by Microsoft are the focus of this paper that considers computer software choices wit...

CPU Properties and the Performance of Computers

In five pages this paper considers Pentium processors and their differences in a discussion of how computer performance is influen...

Ethics of Global Computer Laws

Extending that metaphor one step further, Katsch (1995) comments that the invasion of legal spaces by cyberspace, however, goes be...

Individual Privacy and Computers

for consumption by the government, organizations, companies and a whole host of other mediums where computers are utilized to tran...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

E-mail's Influence on Corporate Management Practices

A paper discussing the impact and influence e-mail has had on the corporate landscape. The author discusses the impact of other c...

Computer Domains, Software, and Selection Critera

Computer domains are the subject of this paper consisting of two pages along with the various types of equipment required in order...

Comparison of the Inventions of Computers and Trains

This essay consists of fifteen pages and considers whether the computer or the train was the more significant invention in terms o...

Book Review of M. Keller's Rude Awakening

In five pages this book review considers how lack of employee training was the result of computer technology implementation at the...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...