SEARCH RESULTS

YOU WERE LOOKING FOR :Case Study on Computer Consulting

E-mail's Influence on Corporate Management Practices

A paper discussing the impact and influence e-mail has had on the corporate landscape. The author discusses the impact of other c...

New Jersey Land Use, Right of Way, and Surveying

In eight pages New Jersey land use is examined in a consideration of such topics as surveying and right of way along with the 1949...

Developing the U.S. Constitution

The U.S. Constitution has grown and changed greatly since its ratification. This paper examines how amendment and reinterpretation...

Anthony Lewis's Gideon's Trumpet

how a previously made poor decision reached by the Supreme Court was ultimately corrected with the Gideon case. Contents : Chapt...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Cain v. Department of Corrections Legal Brief

In five pages this legal brief sample involving a Michigan Supreme Court case is presented in a case overview with facts, issues, ...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

Gender Bias and Male Social Workers

In twenty pages this research study ponders the social work profession and the effects of gender bias as they relate to male in a ...

Amicus Curae Brief Filing, the 1st Amendment, and School Prayer

This report consists of twelve pages and considers issues pertaining to the Establishment Clause and the U.S. Constitution's 1st A...

Automobiles and Computers

In forty seven pages this paper discusses automobiles and the impact of computer technology on them. Seventeen sources are listed...

Consideration of Computer Technology

In a paper consisting of four pages the origins of modern computer technology, the abacus, are considered as their evolution progr...

Modern Technology and Gender

In five pages computer technology as it is related to gender is examined. Five sources are cited in the bibliography....

Comparison of the Inventions of Computers and Trains

This essay consists of fifteen pages and considers whether the computer or the train was the more significant invention in terms o...

Manufacturing and the Airline Industry

In thirteen pages this paper considers various aerospace and aircraft manufacturing methodologies as well well as the effects of c...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Automotive Manufacturing and Computer Technology

of automobile that are more skillfully designed, better built and most importantly safer, all as a result of the vast applications...

Positive and Negative Aspects of Computers

and dilemmas of computerization really work out for large numbers of people under an immense variety of social and technical condi...

Book Review of M. Keller's Rude Awakening

In five pages this book review considers how lack of employee training was the result of computer technology implementation at the...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Six T's of Elementary Literacy Instruction by Richard Allington

This essay pertains to the six categories of elementary instruction that were discerned from an extensive study of some of the bes...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

The "Craigslist Killer," Philip Markoff

This research paper pertains to the case of the "Craigslist Killer," Philip Markoff. The writer describes his early life, the case...

llegality of Assisted Suicide in Regards to the 14th Amendment

This 5 page paper provides an overview of a case where physicians were sued for assisting terminal patients with suicide and were ...

Case Management, Leininger's Theory

This case management paper pertains to a Hispanic man with type 2 diabetes and draws upon Madeleine Leininger's Cultural Care Dive...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Diabetes Prevention, A Study Profile

This research paper/essay presents a summary of the study conducted by Whitteore and colleagues (2012). Based on this study, the w...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Proposed Study, GCSS-Army

This essay is a proposed study about the implementation of the Global Combat Supply System—Army (GCSS—Army). The proposed study f...

Could the Leaders of Boko Haram be Charged with Crimes Agsinst Humanity?

Boko Haram are an Islamic jihadist organization based in Nigeria who became known for the kidnapping of more than 200 Christian s...