SEARCH RESULTS

YOU WERE LOOKING FOR :Apple Computer Comprehensive Case Analysis

Essays 1891 - 1920

Simplification of the Process of Computer Shopping

In five pages this paper presents a spreadsheet which demonstrates how computer shopping can be simplified. There are no sources ...

1990s' Personal Computer Shopping

In four pages this paper discusses what must be considered in shopping for a personal computer in the 1990s with such topics as IS...

Comparison of UNIX, OS2, and Windows Computer Operating Systems

In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a c...

Choices in Computer Software

In six pages Oracle's Oracle 8 and Access 97 by Microsoft are the focus of this paper that considers computer software choices wit...

CPU Properties and the Performance of Computers

In five pages this paper considers Pentium processors and their differences in a discussion of how computer performance is influen...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...

Computers and the Law

This paper consists of five pages and examines the various ways in which judges and lawyers utilize computers. Five sources are c...

Disadvantaged or Low Income Learners and Computer Literacy

A proposal outline consisting of eleven pages describes computer literacy program funding designed to assist students who are eith...

Home Computer System Purchase

In five pages this paper considers hardware, software, speed, and size as each pertains to buying a home computer. Four sources a...

Computers and Buddhism

In eight pages computers and their increasing role in Buddhism adherents' lives are examined in the expanded methods of worship, s...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Law and Computer Crime

In five pages the federal and state laws created to prevent the increasing instances of computer crime are discussed. Five source...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Field of Computer Graphics

Computer graphics are defined along with a discussion of its business and entertainment uses in a research paper consisting of fiv...

Video to Go Hypothetical Business Case Study

This paper consists of six pages and discusses the importance of computer technology to the hypothetical Video to Go company and e...

Real Estate Property Management and Computer Networking

Real Estate property management and the importance of computer office networking are discussed in five pages. Three sources are c...

CPA Company's Computer Software Upgrading

Peachtree itself requires only 486-level capability and Windows 3.1 or Windows 95. However, the data generated by an accounting f...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Cross Curriculum Pros and Cons of Computer Usage

In fifteen pages this paper discusses elementary education and the uses of computers in a consideration of pros and cons. Twenty ...

History and Future of Computer Networking

In eight pages the history of computer networking is discussed along with the importance of operating system choice, policy establ...

Firefighting Assistance from Computers

to accurately predict the conditions in which the fire would burn out (Walton, 1985). This revolutionary computer "expert syste...

Methods of Computer Storage

This paper consists of fifteen pages and examines the latest technology involving methods of computer storage with solid state sto...

Place, Space, an the 'Infobahn' in City of Bits by William J. Mitchell

A book report on City of Bits by William J. Mitchell consists of five pages and considers the pervasive social and individual infl...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...

Learning Theories and Human Development

In twelve pages human development is examined in terms of various applicable theories including those of Case, Vygotsky, Erikson, ...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

Capital Cases and VIS' Constitutionality

In twenty five pages this paper examines capital case sentencing in an overview of Victim Impact Statements and their constitution...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...