SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Manufacturing and Job Costing

Essays 1321 - 1350

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Employment Law and Employer Duties; A Case Study

is also an obligation on the employer to ensure that there are adequate welfare facilities arrangements, which may help counteract...

How Computers Weaken Language Skills

a poem as well as a human being, the real problem is not skill, but in ideology. That is, many people tend to rely on computers an...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

3 Education Research Proposals

policies, implementation and use may occur, impacting different stakeholders. 2. Methodology To assess the way popular media a...

Acer

notebooks and net books, specifically the Aspire, with Acer selling 9.67 million units in the third quarter of 2008 alone, this wa...

Personal Computer Problems as a Sample Essay Narrative

would help me become a self-employed entrepreneur, and the tasks that used take me hours complete would now be simply a matter of ...

ARP Protocol Subversion and Network Security

an Internet browser, some type of an email program, or other kinds of programs that can gather information from a particular Inter...

3 Corporate Marketing Questions Answered

differences and similarities do you see between domestic marketing and international marketing at Encyclopedia Britannica Inc.? ...

EU and UK Law Applied to Case Study Involving Faulty Goods' Sale and Pregnancy Discrimination

In a paper consisting of twelve pages and three parts EU and UK law applications are examined in terms of territorial arrangements...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

John Galtung/Theory and Methods of Social Research

located outside the social scientist himself, and we shall follow this tradition" (Galtung 9). As this indicates, Galtung does not...

SECURITY OF INFORMATION

2005). Problem is, it also makes any real commerce or anything else impossible too (Miller, 2005). Moving on to other pot...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Description and Occupational Outlook of Computer Programming

In six pages the field of computer programming is examined in terms of its duties, salary, risks, and future occupational outlook....

Internet, Computers, and Global Issues

to create problems, while others are out to do damage (Adams, 2000). There is in fact a debate on the ethics of hacking as there a...

Management, Organizational Structure, and National Culture

of Texas, Pan American, 2003). There must be interaction between the two. One author explained: "National culture relates to an in...

Political Sensitivity and Spatial Products

earths surface, triangulating time and distance between one satellite, a position on earth, and another satellite. Reliable cover...

'Strategic Intent' and Company Operations

relentlessly targeted Southwest in demarketing efforts, Southwest not only continued to exist. Eventually, it surpassed all of th...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Prehistorica Computers and Case Study Analysis on eBusiness

programmers may have to work and maintain the site on an ongoing basis. It will likely mean buying new hardware and dedicating a s...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Hypertext

, 2000). Hypertext, when it is combined with the telecommunications revolution, surely becomes the largest change in the way in...