SEARCH RESULTS

YOU WERE LOOKING FOR :Business Computer System Design

Essays 1861 - 1890

Failures at the Passport Office; The Summer of 1999

to identify these, taking an approach where factors are classified in terms of the materials, the location, the technicians and th...

Memory, Cognition & Media Questions

it seems reasonable to predict that scientists will soon understand much more about the causes of these diseases and also how to p...

Industry Report of Internet Computer Marketing in Europe

higher tech products, such as computers it may be argued that the potential market may be more attractive. Simply by the nature of...

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

Computer Games and Gender Prejudice

conspicuous, while at other times remain quite subtle; however, one thing is certain: the formation of these variations originates...

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....

Global Market Entry

market is no longer a discretionary decision, any medium to large-size company who wants to retain market share and profit must en...

Malicious Codes

an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the...

Adult Education, College Instruction, and Electronic Learning

back before the first microcomputer was released during the late 1970s. It, in fact, goes all the way back to 1957, when Sputnick,...

Telecommunication Battery Industry

good time, the likely culprit could be the battery. A dead battery in a computer means more than the fact that the computer wont b...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

Computer Security and Internal Corporate Hacking

dissatisfaction with administrative policies. It might be a reaction against a proposed merger that threatens job security throug...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

PC's History and Impact

machine. This single piece of equipment was heralded by PC Week as very possibly being the next industry benchmark. Interestingly...

A Career in Computer Support: Data Replication

nightmare; the business would be virtually unsalvageable in some cases. There are now data replication companies such as that of ...

Information on North American or Canadian Investments

Tel: (250) 712-2167, Toll Free: 1-888-523-6888, Fax: (250) 712-2190 with a web site at http://www.clarkmanagement.com/theteam.ht...

Current Trends Regarding Network Security Issues

home office or to transfer sensitive documents to the boss. It was found that others would enter the home offices portals - hacker...

Military Affairs and the New Technology Revolution in Warfare

In ten pages this paper examines the impact of new military technology in terms of training, computer simulations, and on Kosovo's...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Government Regulation and Computers

looking into various forms of regulation concerning taxation and prohibition based on pornography laws. Also, pornographic materia...

Russian Society and the Effect of Computers

as rapidly as was expected. There isnt enough interest right now. That could be changing, however, as the last few months have s...

Personal Computer Industry of the United States

is "no longer a technology business. You dont need a team of engineers to build a PC today" Jerre L. Stead of the largest distrib...

Execution of Computer Software

different operating systems have completely different architecture, then in looking at how the language a programme is written in,...

Computers and Ordered Message Delivery

adds to the overhead of the messaging system. "The primary cause for message loss is input buffer overflow, which can be avoided ...

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...