SEARCH RESULTS

YOU WERE LOOKING FOR :Apple Computers Struggle Against Microsoft

Essays 2191 - 2220

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Authority and Rebellion in Thelma and Louise, Easy Rider, and Rebel Without a Cause

In five pages this paper examines men, social, and paternal types of rebelling against authority in an examination of this trio of...

Business, Social and Ethical Responsibility

should be assumed by all companies as a matter of course. The debate centres around the actual responsibilities that the or...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Opposing Viewpoints on Prohibition

The writer examines two opposing viewpoints on Prohibition. Billy Sunday preached in favor of it and against alcohol as evil while...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

3 Articles on Homosexuality

In five pages three articles featuring the topic of homosexuality are summarized and analyzed. They are Christopher Hewitt's 'Hom...

Notorious Scopes' 'Monkey Trial'

In twelve pages this paper discusses the intense creationism v. evolution debate this trial sparked in a consideration of evolutio...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Disabled Computer User Software Programs and Assistive Devices

In 7 pages this paper examines the software programs that make computers more user friendly for disabled individuals in a consider...

Military Affairs and the New Technology Revolution in Warfare

In ten pages this paper examines the impact of new military technology in terms of training, computer simulations, and on Kosovo's...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...

Ceasing the Practice of Experimenting on Animals

In six pages this paper agues against animal experimentation with support from the writings of Carl Cohen and Peter Singer. Seven...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Essays on Ethnic Issues

In five pages the essays 'For the Indians No thanksgiving' by Michael Dorris and Ward Charchill's 'Crimes Against Humanity' are co...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Huey P. Long and Charles E. Coughlin's Voices of Protest in the Text by Alan Brinkley

In four pages this essay focuses upon Father Coughlin and Louisiana Senator Huey P. Long's protests against FDR's policies as cons...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

Capitalism and Exploitation of Chinese, Irish, and Italian Immigrants and Native Americans

In seven pages the ways in which capitalism has exploited the Native Americans and discriminated against immigrants most notably t...

E-mail's Influence on Corporate Management Practices

A paper discussing the impact and influence e-mail has had on the corporate landscape. The author discusses the impact of other c...

Antiwar Sentiments of Crane, Twain, and Howells

In five pages the reactions against war and imperialism that began materializing at the turn of the 20th century are examined in a...

Three Arguments Regarding Capital Punishment

In seven pages this paper considers capital punishment and three arguments such as retribution, intolerable capital offenses, and ...

Coral Diver Resort SWOT Analysis

Model Michael Porters famous "five forces model of competition" can also assist Greywell, especially as he compares his own o...

Computer Domains, Software, and Selection Critera

Computer domains are the subject of this paper consisting of two pages along with the various types of equipment required in order...