SEARCH RESULTS

YOU WERE LOOKING FOR :Choices in Computer Software

Essays 1441 - 1470

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...

Hong Kong Presence of Dell Computers

In twenty pages this paper considers how Dell Computers can develop a strong market presence in Hong Kong, where the economy is ai...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Military Affairs and the New Technology Revolution in Warfare

In ten pages this paper examines the impact of new military technology in terms of training, computer simulations, and on Kosovo's...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

4 Entrepreneurs and Their Success

He operates his business with an overriding belief that: "whats good for the customer will ultimately turn out to be in the compan...

Ethical Issues and Computers

workings of a computer hold as much interest for hackers as the workings of a 57 Chevy do for the car fanatic. This interest is ...

Overview of Prolog Programming Language

Phillippe Roussel went to Montreal and consulted with Colmerauer on natural languages and in a report he issued that September Col...

Pricing and Channel Development

a profitability of 5.35 percent, exceeding targets on both measures. Concepts This simulation demonstrates the critical poi...

A BCG Matrix Analysis of Apple

matrix we can see that there are four categories based on four main assumptions regarding the behaviour and attractiveness of the ...

Knowledge Management and the Roles of ICT and Social Processes

which interaction takes place and arte key to the formation of culture within an organization. Social process take place regardles...

Third Party Computers and Denial of Service Attack

unlikely to be any argument for the case not to go ahead. However it is not always with a relationship, the proximity may be more ...

Home Health and Hospice Company Business Requirement Analysis

critical matters, employee requests for information often go unanswered for too long. Results can and have been employee frustrat...

Overview of Digital Mammography

more difficult to spot in mammograms" (Screening Mammograms, 2002). Additionally, standard screening mammograms carry a fal...

Organizational Structure of Dell Computer Corporation

and Dedrick, 2001). Dell has three primary customer segments: large corporate customers, referred to as relationship customers; h...

Apple Computers and the Information Age

the information revolution is not able to contribute to the development of democratic systems, even though it clearly can offer th...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Types of Computer Viruses

piggybacks on other real programs is known as a virus (Brain, 2005). For example, a virus could attach itself to a spreadsheet pr...

Total Quality Management in Nonprofits, Retail, and Manufacturing

customization" into practice - and its quality always was superlative. The end result was that customers overwhelmingly approved ...

Examination of Computer Ethics

an apparatus for automatic control; and that its input and output need not be in the form of numbers or diagrams. ...... Long befo...

Selection of Management Information Systems

However, it may be more beneficial to use a stand-alone application which is designed specifically for e-mail. These stand-alone ...

Claims Processing and IBM and EDS Affiliated Computer Services

are from magazines and journals. The Internet, used properly, is a sound and reliable resource, as long as researchers remember t...

Claims Processing Outsourcing

of shifting/delegating/transferring a service/process/function to a third-parties/external service provider which would otherwise ...