SEARCH RESULTS

YOU WERE LOOKING FOR :Apple Computers Struggle Against Microsoft

Essays 1771 - 1800

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

Capitalism and Exploitation of Chinese, Irish, and Italian Immigrants and Native Americans

In seven pages the ways in which capitalism has exploited the Native Americans and discriminated against immigrants most notably t...

E-mail's Influence on Corporate Management Practices

A paper discussing the impact and influence e-mail has had on the corporate landscape. The author discusses the impact of other c...

Antiwar Sentiments of Crane, Twain, and Howells

In five pages the reactions against war and imperialism that began materializing at the turn of the 20th century are examined in a...

Individual Privacy and Computers

for consumption by the government, organizations, companies and a whole host of other mediums where computers are utilized to tran...

Internet Security and Software

In nine pages this report discusses software designed to ensure against credit card fraud over the Internet. Seven sources are ci...

The Classic Film Casablanca

The writer explores the plot, characters, setting and other elements of the 1942 classic film Casablanca, starring Humphrey Bogart...

Ethics of Global Computer Laws

Extending that metaphor one step further, Katsch (1995) comments that the invasion of legal spaces by cyberspace, however, goes be...

Three Arguments Regarding Capital Punishment

In seven pages this paper considers capital punishment and three arguments such as retribution, intolerable capital offenses, and ...

Pros and Cons of School Vouchers

This paper consists of seven pages and after assessing school vouchers' pros and cons, comes out against them. Five sources are c...

Video to Go Hypothetical Business Case Study

This paper consists of six pages and discusses the importance of computer technology to the hypothetical Video to Go company and e...

Real Estate Property Management and Computer Networking

Real Estate property management and the importance of computer office networking are discussed in five pages. Three sources are c...

Plan Proposal for Computer Game Business

In thirteen pages and five sections the CuttingEdge computer game business is examined in a proposed plan that includes company in...

Communications of the Future and IT

In five pages this paper discusses information technology in a consideration of computer developments past, present, and changes r...

Field of Computer Graphics

Computer graphics are defined along with a discussion of its business and entertainment uses in a research paper consisting of fiv...

Ivan Pavlov's Contributions

In five pages this paper evaluates Ivan Pavlov's scientific contributions but also examines the animal cruelty criticisms levied a...

Methods of Computer Storage

This paper consists of fifteen pages and examines the latest technology involving methods of computer storage with solid state sto...

The Arts and Perceived Inferiority of Women

In five pages this paper examines the arts in a consideration of the historical discrimination against women. Three sources are c...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Meteors and the Defense of the Earth

The rare fragment that survives and actually lands on earth-that is a meteorite" (pp. 90). Krajick (1999) adds that modern...

How Social Security Can be Reformed

In five pages this research paper discusses Social Security and how it can be reformed with privatization arguments for and agains...

Classroom Behaviorism Charges' Rebuttal

In ten pages this paper represents a rebuttal to the charges against classroom uses of behavior change tools and behaviorism. Ele...

CPA Company's Computer Software Upgrading

Peachtree itself requires only 486-level capability and Windows 3.1 or Windows 95. However, the data generated by an accounting f...

Compaq vs. Dell

delivered through old and tired methods. The very nature of the Internet has contributed to the success or lack of it for m...

An Article Critique of 'Protection Against Ischemic Heart Disease In The Belgian Physical Fitness Study: Physical Fitness Rather Than Physical Activity?'

which takes place during ones leisure time. Noting that it is not easy to establish a method for controlling self-selection into ...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...