SEARCH RESULTS

YOU WERE LOOKING FOR :Brief History of Computer Operating Systems

Essays 2731 - 2760

The Deleterious Effects of Computer Gambling

are admitted sex addicts and "shopohaulics." No one would want to outlaw shopping or sex, but of course, sex and shopping are regu...

AN EXAMINATION OF COMPETITIVE PRICING THROUGH QUASAR COMPUTERS

the kneejerk reaction of moving pricing in response to competition is a sure way to failure. Price wars, the authors note, benefit...

Computer Environment and Making Smart Networking Choices

For example, a peer-to-peer network might be right for some firms but not for others. Such a network allows all workstations and t...

COMPUTER SECURITY AND BRUCE SCHNEIER

be shared. Schneier points out, for example, that China, though not exactly our ally, also has computers, and has the same securit...

Revenue Assessment and Projected Income Statement for Micro Chip Computer Corporation

one year of improvement this is unlikely to be accurate. Tools such as regression analysis may also be used, this looks at previou...

COMPUTER-GENERATED IMAGERY AND ITS IMPACT ON FILM ANIMATION

the 1980s, animation techniques came in two versions: Drawn and model (also known as stop-motion) (Mitchell, 2002). Cel animation ...

Dell Computer Strategies

This is a report about Dell Inc., founded in 1984. Dell offered a unique experience to consumers at the time. The paper considers ...

Strategic Initiatives in Digital Media: Apple Computers, Inc.

that can do no wrong. Once a distant second in the home computer market that was facing irrelevancy as big-box companies like Dell...

Working at Apple Computer

a calling" (Apple, Inc., 2010e). And, it is. One must be passionate to work successfully at Apple. Steve Jobs has very high expect...

Tulving/Episodic Memory

ways, K.C. has normal cognitive functioning, as his "intelligence and language are normal" (Tulving, 2002, p. 13). He can read and...

Issues in Australian Law

The second basis of the appeal was that evidence of an alibi had been excluded by the initial trial judge under s.150 of the Crimi...

Legality of Computer Ethics

In a paper of five pages, the writer looks at legal issues of computing. Ethics and security issues are examined as well. Paper us...

Employers Monitoring Computer Use

There is no single comprehensive law that covers employee privacy rights or what types of privacy an employee should expect. Due t...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Computer Gambling and Marketing Campaign Management

In five pages this paper discusses how to creatively and successfully market Internet gambling casinos in the United States in a p...

A Fiscal Investigation of Apple Computer, Inc.

In ten pages this research paper conducts an Apple investigation that includes financial reports, company setbacks, SWOT analysis ...

Computer Problems and Concerns Resulting from the New Millennium Transition

In six pages this paper presents an overview of Y2K that considers problems, issues, theories, and preventative measures. Five so...

Computers and HR Training

In about twelve pages this concept paper discusses manufacturing and the effectiveness of interactive training with the use of CDs...

Computer Technology and the Accounting Profession

In this paper containing six pages different areas within the field of accounting are considered along with the contention that qu...

Comparative Analysis of Computer Industry Giants

In five pages Compaq, Dell, Gateway, IBM, and Hewlett Packard are compared and examined in terms of a five year forecasting of est...

Reviews of Articles on Various Computer Subjects

In four pages article reviews of approximately two paragraphs each consider such varied topics as robotics, software policy, Inter...

Overview of the Uniform Computer Information Transaction Act Law

An overview of this proposed law and its impact on America's corporate sector and consumers are presented in a paper consisting of...

Computer Music and its Social Effects

This paper discusses how digital or computerized music and its technology have significantly affected society in five pages. Four...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Super Computers Inventor Danny Hillis

In five pages the history of supercomputers, their inventive creator, and their current uses, are examined. Three sources are cit...

Future Education and Computers

In ten pages future education is contemplated with a discussion of case studies and consideration of such topics as interactive me...

Carol Gould's Edited The Information Web Ethical And Social Implications Of Computer Networking Reviewed

In five pages this essay compilation first published in 1989 are reviewed in a consideration of information abuses and the importa...

How Computer Software Can Help the Real Estate Appraiser

used today. A lawyer who has property management experience may hone in on particular problems not picked up by todays new types o...

Dell Computers An Analysis

great deal more than foreign companies. There are strict laws and regulations that govern things like using the Internet (Morato)....

The Computer In Criminalistics

connect him or her to a particular cyber crime. Indeed, policing tactics have vastly improved over the years to include such aspe...