SEARCH RESULTS

YOU WERE LOOKING FOR :Brief History of Computer Operating Systems

Essays 241 - 270

Civil Engineering Applications of Computer Technology

In fifteen pages computer technology is examined within the context of its impact upon civil engineering in terms of operations an...

What's the Buzz About Y2K?

In this paper consisting of twenty one pages this paper examines the banking industry in an overview of the implications of the Ye...

Computer Software and Hardware Assessment Questions

the collective skills of a workforce; categorize customers purchases during a single visit to a retail store; or other points pert...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Dell's New Strategy Plan

tag, it is hard to know whether or not the future will be just as kind to this firm that has done well so far. After all, the econ...

Prototype Model Building and Layer manufacturing

v4.3.2 from IBM and Solaris v2.6.0 from Sun Microsystems, all of these will require OpenGL. Various windows formats are also used...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

Being Digital by Negroponte

history of the digital age, would be able to make an intelligent prediction about the future, but he does not. Rather, he leaves t...

Blue Reserve Office Building Analysis

to take into account both land-based phones and portable phones as well. In addition, telephony systems today must support...

Measurement Inc. Decision for Purchasing a Computer System

than sixty employees, four managers and a senior manager who reports directly to the president of the company. This senior manage...

Case Study on Decision Making

the different aspects will be considered, rather than a single item gaining a disproportional relevance. Question 2 After readi...

Protection and Data Risk

exploitation of any potential vulnerabilities that have been discovered in stage 1, the actual hacking, either to gain the inform...

Function and Form as They Involve Graphic User Interface

In six pages computer systems are considered in a discussion of graphic user interface function and form. Four sources are cited ...

Technological Needs of a Home Office

In four pages this report examines what an accountant's home office should include in terms of technology which include a consider...

Overview of PKI

In six pages this paper considers computer networking protection through public key infrastructure in this overview that includes ...

Disabled Computer User Software Programs and Assistive Devices

In 7 pages this paper examines the software programs that make computers more user friendly for disabled individuals in a consider...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Commercial Environment and Computer System Implementation

In eight pages a case study is used to discuss the problems involved in the development and implementation of a business computer ...

Overview of Hydrodynamic Hull Testing Development

In ten pages this paper presents the development of hydrodynamic hull testing in an overview that includes history, technology, co...

Digital Era and the Certified Public Accountant's Role

will have to go about it. Largely, these changes are positive and open new doors for those in the field. In focusing in on the ch...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Using Technology to Help Teach World History

This 5 page paper discusses ways to use the computer, Internet and other technology to teach world history. The writer argues that...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Therac-25: A Socio-Technical System

this safety net should have been provisions that insured the computer would detect when a high-powered electron beam was chosen by...

COMPUTER MOTHER BOARD

typically include functional units of a computer including the central processing unit, microprocessor, memory, the basic input/ou...

Project Proposal; A New Computer System for a Retail Firm

more accurately to changes in demand. The implementation of a system, to allow for the different elements of the business to be br...

Home Health and Hospice Company Business Requirement Analysis

critical matters, employee requests for information often go unanswered for too long. Results can and have been employee frustrat...

Overview of Prolog Programming Language

Phillippe Roussel went to Montreal and consulted with Colmerauer on natural languages and in a report he issued that September Col...