SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Information System Design

Essays 1441 - 1470

The History of the Modem

This paper examines the history and evolution of the computer modem. This five page paper has six sources listed in the bibliogr...

Turkey and the Marketing of Computer Hardware

that a number of other entities will also recognize the opportunity, as well. II. TRANSPORT BARRIERS FOR PRODUCT Computer hardwa...

Analysis of an Advertisement Featured in Time Magazine II

In two pages this paper discusses an IBM notebook computer advertisement featured in a Time Magazine issue in an analysis of the p...

Language Acquisition and the Theories of Noam Chomsky

In five pages the differences between Professor Chomsky's theories on language as compared to their predecessors are examined with...

Comparative Analysis of Biological and Computer Viruses

viruses have the potential to completely wipe out a computer system. Computer viruses have not, of course been photographed or dr...

Computer Industry Contributions of Seymour Cray

In eight pages supercomputer 'father' Seymour Cray is discusses in an examination of his computer industry contributions. Seven s...

The Development and History of Artificial Intelligence

and mathematicians. The conference took place in 1956 at Dartmouth College(Shipley 64). From that point forward the concept of art...

Can Computers Lie?

The Human Brain Descartes argued that the mind is an entirely separate substance from the body because he can "think" of...

Germany and the Marketing of Computer Hardware

third largest, and accounts for somewhat more than one-fourth of the European Unions GDP. According to BusinessEurope (1998), amon...

Digital Radio Developments

their shapes and forms, which is why there is more background noise and interference with their transmissions. Two other ...

Societal Impact of Computer Technology

In five pages the destructive societal implications of computer technology are argued. Five sources are cited in the bibliography...

Stock Market History

In twelve pages this paper considers the history and development of the U.S. stock market from its colonial origins through the su...

Films and 3D Computer Graphics

film, it takes many thousands of frames to make even a few minutes of time in the finished movie. The most famous example of thi...

Movie Advertising and Placement of Products On Screen

In nine pages this paper considers how products benefit from being placed on screen in television shows, computer games, and films...

Corporate Vision and Apple Computers

is, "a launch-pad for a concentrated and coherent campaign to mobilize people, first to get excited about the vision -- and then t...

Employee Monitoring Through Computer Software

In five pages this paper argues that employers utilizing computer software to monitor employee emails and usage of the Internet is...

Importance of Literacy in the Workplace

more and more apart. In the 1990s, one fact that has become painfully apparent is the role of literacy in dividing society into a ...

LAN Computer Network Construction

In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniq...

Study on Korea's Market Attractiveness

In eight pages this paper examines the appeal of the Korean market for importing computer software. Six sources are cited in the ...

Y2K, the Year 2000, and Thereafter

Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...

Role of Management in Avoiding Y2K Catastrophe

In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...

Year 2000 Problem and its Economic Implications

The problem of panic is directly linked to the perceptions and actions of a number of Y2K alarmists, who have argued that the gove...

Obvious Impacts of the Millennium Bug

This paper examines the various computer problems associated with the date change to January 1, 2000 in eight pages. Eight source...

Computers and the Y2K New Millennium Bug

This paper examines the many computer problems that can result from the Y2K bug upon the year 2000 in five pages. Three sources a...

Year 2000 Computer Crisis

mayhem in the world. Most computer programs have a two-digit date field, thus when the year 1998 is keyed in, the computer reads o...

Marketing Strategies Dell vs. Apple Mac

to the overhead luggage compartment and bringing down his G4 iBook, then, Troyer pulls his G4 iBook from under the seat (Lipperts,...

Types of Computer Viruses

piggybacks on other real programs is known as a virus (Brain, 2005). For example, a virus could attach itself to a spreadsheet pr...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Claims Processing and IBM and EDS Affiliated Computer Services

are from magazines and journals. The Internet, used properly, is a sound and reliable resource, as long as researchers remember t...

Claims Processing Outsourcing

of shifting/delegating/transferring a service/process/function to a third-parties/external service provider which would otherwise ...