SEARCH RESULTS

YOU WERE LOOKING FOR :Case Study on Computer Consulting

Classroom Uses of Computers

In nine pages the ways in which computer technology has been integrated into the classroom are examined in terms of the benefits i...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Voting Behavior and the Impacts of Class and Race

have less, they also fear the law. These less well off factions have been treated unfairly, so even if a black person from a nei...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Military Affairs and the New Technology Revolution in Warfare

In ten pages this paper examines the impact of new military technology in terms of training, computer simulations, and on Kosovo's...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Property Rights and Lucas v. South Carolina Coastal Council

In eight pages this paper offers case summary and also considers how property rights are addressed by the case. Five sources are ...

Hong Kong Presence of Dell Computers

In twenty pages this paper considers how Dell Computers can develop a strong market presence in Hong Kong, where the economy is ai...

The Debate Surrounding Abortion as Revealed in Contested Lives

abortion conflict at the grass roots level is enlightening towards the understanding the national debate. According to Ginsburg,...

India, Computers, and Girls

girls will continue to be stricken from the progress of modern technology. School girls can only gain the requisite confidence to...

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Charitable Donations and Honesty Research

- Setting the Scene This proposal involves the study of the ethical response of the charitable reaction among varying socioeconom...

Supreme Court Chief Justices

In three pages Supreme Court Justices John Marshall and William H. Rehnquist are discussed within the context of the 1832 case Wor...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...

Fatigue and its Impact on Emotions Study

In a paper consisting fo 6 pages a hypothetical study of fatigue is discussed in terms of its impact upon emotions and assesses th...

Disabled Computer User Software Programs and Assistive Devices

In 7 pages this paper examines the software programs that make computers more user friendly for disabled individuals in a consider...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Infamous 'Scottsboro Boys' Trial

In seven pages this paper discusses the way in which justice fell short in this infamous case and also considers how to expand res...

A Prejudice Experiment

In eight pages a student supplied hypothetical experiment is used in order to discuss how juries are selected in an instance where...

Ethics Awareness Inventory

also something that is easily masked. Bad people can appear good and vice versa. Making a determination about an individuals tru...

SIGGCHI (Web Site Analysis)

computers, the name of the group might be confusing. The following explanation appears as to why the group is in existence: SIGGCH...

Language And Syllogisms

and the Internet could well be viewed as a foreign language. For example, consider the word mouse which is a creature, and undesir...

The Protection of Personal Data (A First Person Essay)

seems as if the bank has a good system of protection. Mullins (2002) explains that some programmers implement a system so that aft...

Assessing Usability

for example is something that refers to the use of technology to help the group, something that is done with the use of network or...

Analysis of Main Line v. Basinger Court Case

value, Sherilyn Fenn, a B-movie actress who had starred in David Lynchs television series Twin Peaks (Thompson, 1992). As a resul...

IBM Proposal for a Knowledge Management Program

nineteenth century, and develops through the twentieth century, always based in the development of new technologies. IBM have been...