SEARCH RESULTS

YOU WERE LOOKING FOR :Children Computer Addiction and Problems of Social Development

Essays 391 - 420

Therapy can save Marriages

Families face a myriad of concerns and issues. Parents may disagree about parenting styles, there may be behavioral or academic pr...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

Computers Use for Education and Leisure for the Visually and Hearing Impaired

use of computers increase or decrease the social interaction of the hearing impaired learners? Introduction Educators and ...

Technological Innovations Between 1930 and 1944

time was use of carbon paper to make several copies of the same document. If Carlson was to get additional copies of patented expe...

Computer Problems and Concerns Resulting from the New Millennium Transition

In six pages this paper presents an overview of Y2K that considers problems, issues, theories, and preventative measures. Five so...

Bilingual Education and Computer Technology

In eight pages this paper discusses bilingual education programs and the problems and challenges of computer technology implementa...

Computer Phobia and Gender Differences

they need from its depths. It has been estimated that only about 10 percent of approximately twenty million internet users around...

Reading Text: Electronic Versus Paper

This 5 page paper gives an explanation of reading electronic text versus reading hard copy text. This paper includes studies about...

Obvious Impacts of the Millennium Bug

This paper examines the various computer problems associated with the date change to January 1, 2000 in eight pages. Eight source...

Computers and the Y2K New Millennium Bug

This paper examines the many computer problems that can result from the Y2K bug upon the year 2000 in five pages. Three sources a...

Civil Engineering Applications of Computer Technology

In fifteen pages computer technology is examined within the context of its impact upon civil engineering in terms of operations an...

Y2K, the Year 2000, and Thereafter

Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...

Role of Management in Avoiding Y2K Catastrophe

In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...

Year 2000 Problem and its Economic Implications

The problem of panic is directly linked to the perceptions and actions of a number of Y2K alarmists, who have argued that the gove...

HIV Youth and Computers

In five pages this report discusses computer technology as it pertains to youth afflicted with HIV in terms of applications and po...

The Application of Censorship Principles Banning the Work of Homosexual Writers of Children's Literature

5 pages and 6 sources. This paper provides an overview of arguments in favor of the censoring of literature written by homosexual...

Children's Literature History

In ten pages the Middle Ages origins of children's literature to contemporary children's writings are chronicled in this historica...

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Elementary School Student and Self Esteem

In ten pages this paper examines a young child's self esteem in a consideration of Chinese children's age and gender differences, ...

Analysis Cinderella

In one page this much loved children's story is analyzed in terms of its retelling that is based on the film by Walt Disney as it ...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Small and Medium Business Accounting Information Systems

In this five page paper the impact of accounting systems on small and medium sized businesses are assessed with such issues as the...

Current Trends Regarding Network Security Issues

home office or to transfer sensitive documents to the boss. It was found that others would enter the home offices portals - hacker...

A Revised Computer System and the Problems of Audio Visual Corporation

cut down on extra time and money the company did not need to be spending. In order to eliminate these wasted resources, Audio Vis...

Children's Literature and the Use of Comedy

Comedy is almost universal in children's literature. This paper examines how a number of children's books make use of this storyte...

Apple Computer - Case Study

The writer gives a short history of Apple Computer, a statement of the problem and a possible recommended course of action. The wr...

An Overdoes of Intravenous Medication and a Change Theory Application

while in the hospital plus the incidence of symptoms and/or disease that would have initially required use of the medication. In ...