SEARCH RESULTS

YOU WERE LOOKING FOR :Apple Computer Supply Chain Issues

Essays 481 - 510

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

Issues of Computer Security

Carroll (1995) makes the point that whilst it is possible to establish a reasonable amount of security on the Internet, the way in...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Issues Involving Computer Viruses

In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered...

Examination of Computer Ethics

an apparatus for automatic control; and that its input and output need not be in the form of numbers or diagrams. ...... Long befo...

Publius Case Study

retrieve the document, hed go to a directory kept on "a Publius-affiliated Web site" and then the "network itself would do the wor...

Colombia and the Marketing of Computers

There were 488 radio stations in Colombia in 1999, 454 AM and 34 FM, as well as 60 television broadcast stations (Colombia). Thou...

Assessing Usability

for example is something that refers to the use of technology to help the group, something that is done with the use of network or...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Introduction to Psychobiology

the brain waves. Electrodes are places on the scalp and a machine picks up the shape and types of waves, e.g., alpha waves or beta...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Telecommunication Battery Industry

good time, the likely culprit could be the battery. A dead battery in a computer means more than the fact that the computer wont b...

Government Regulation and Computers

looking into various forms of regulation concerning taxation and prohibition based on pornography laws. Also, pornographic materia...

Execution of Computer Software

different operating systems have completely different architecture, then in looking at how the language a programme is written in,...

Current Trends Regarding Network Security Issues

home office or to transfer sensitive documents to the boss. It was found that others would enter the home offices portals - hacker...

UK's Policy on Technology

as well as medical miracles. Technology affects everyone and many industries. In honing in on a few major ones, Britains policy ma...

Small and Medium Business Accounting Information Systems

In this five page paper the impact of accounting systems on small and medium sized businesses are assessed with such issues as the...

Replication of Data

is stored on computers within an organization would be a total nightmare; the business would be virtually unsalvageable in some ca...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Article Summaries on Topics of Computer Viruses, CPUs and Speed, and the Internet

than normal, unexplainable file size changes, program-operating problems, difficulties in booting the system, and bizarre graphics...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Comparison of UNIX, OS2, and Windows Computer Operating Systems

In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a c...

Choices in Computer Software

In six pages Oracle's Oracle 8 and Access 97 by Microsoft are the focus of this paper that considers computer software choices wit...

Analysis of an Advertisement Featured in Time Magazine II

In two pages this paper discusses an IBM notebook computer advertisement featured in a Time Magazine issue in an analysis of the p...

Proctor and Gamble Communication and Management Issues

its category in Europe for all of 1997, and the company achieved that record in the face of intense competition for the market (Mi...

Turkey and the Marketing of Computer Hardware

that a number of other entities will also recognize the opportunity, as well. II. TRANSPORT BARRIERS FOR PRODUCT Computer hardwa...

Year 2000 Problem and its Economic Implications

The problem of panic is directly linked to the perceptions and actions of a number of Y2K alarmists, who have argued that the gove...