SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Games and Gender Prejudice

Essays 1261 - 1290

English Language Instruction and Computers

which parts of a computer programme are the most effective at helping students learn English and should result in a model of the r...

Computer Attacks and Internet Security

The company was the victim of a "classic Distributed Denial of Service (DDoS) attack generated by the coordinated efforts of many ...

Society, Young Adults, and Computer Technology

is either because they cannot afford computer technology. In other cases, however, it might be explained as being due to the fact ...

A BCG Matrix Analysis of Apple

matrix we can see that there are four categories based on four main assumptions regarding the behaviour and attractiveness of the ...

Market Demand Forecasting and Marketing Simulation I

worth everything theyve directly paid for it. That was the leading reason for keeping the price lower than it could have be...

Ethical Issues and Computers

workings of a computer hold as much interest for hackers as the workings of a 57 Chevy do for the car fanatic. This interest is ...

Overview of Prolog Programming Language

Phillippe Roussel went to Montreal and consulted with Colmerauer on natural languages and in a report he issued that September Col...

Pricing and Channel Development

a profitability of 5.35 percent, exceeding targets on both measures. Concepts This simulation demonstrates the critical poi...

Computer Network Security: Security Devices

visited the most" (Surfing the Internet on-board the Web, 1995). Having this information allows these companies to create a target...

Business Plan for ABC Books

computers at a minimal cost, but as much as possible, keep them similar for the sake of simplicity. Additionally, when purchasing ...

Computer Comparison and Evaluation Memo

operating system is important as well, but that can be changed and all of the evaluated computers include Microsoft Windows(r) XP ...

Production of a Single Commodity

catches on, can make or break a technology company in a short amount of time" (Value chains, 2006). Companies that are going to ke...

St Vincent Case Study

managed healthcare companies. The hospitals have to provide the healthcare in a manner that meets their core values and standards ...

Technology/Hospitality Industry

aided both brands in achieving the goal of operating more efficiently, as hotel management can now run the properties more effecti...

Oil Industry's Changing Technology

In twelve pages this paper examines how the oil industry changed in the 20th century due to such technology as satellites, compute...

U.S. Computer Age

In twelve pages this paper examines the U.S. in a consideration of the social impact of computers. Eight sources are listed in th...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...

NonProfessionals, Health Education, and Computers

In five pages the applications of computers in community and academic settings are evaluated as they relate to the health educatio...

Article Critique/Portion v. Serving Size

2006, p. 31). The program also aids the user in learning to make healthy food choices and in understanding the role of good nutrit...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Military Affairs and the New Technology Revolution in Warfare

In ten pages this paper examines the impact of new military technology in terms of training, computer simulations, and on Kosovo's...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Disabled Computer User Software Programs and Assistive Devices

In 7 pages this paper examines the software programs that make computers more user friendly for disabled individuals in a consider...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

At the Classroom Forefront Apple Computers Remain

In a paper consisting of five pages the ways in which innovative marketing has kept Apple in control of the education market are e...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...