SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Recycling

Essays 871 - 900

Computer Music and Its Impact Upon Society

in the past (Forest 35). For example, using Macintosh computers and a software program called "Kids Notes," four-year-olds can c...

Corruption of Business Through the Computer Security Endangerment of Internet Hacking

is practically nothing that computers do not influence in one manner or another, which has caused society to render itself depende...

Ray Kurzweil's The Age of Spiritual Machines, When Computers Exceed Human Intelligence

This book is examines in a paper consisting of 6 pages. There is 1 source cited in the bibliography....

Computer Graphic Designes in the 2Oth Century

A paper consisting of 30 pages twentieth century graphic design is considered with a discussion of various influential development...

A Strategic Case Study of Acorn Computers

In ten pages this paper considers a student supplied case study that applied short term rather than long term corporate strategies...

The Use of Computer Aided Design and its Layer Standards

5 pages and 3 sources used. This paper provides an overview of the central components of the CAD operations with a specific focus...

Mission Critical Data Personal Computer Environment Storage

control still (and will continue to) include management of security, maintenance and backup of data. These can all be summarized w...

Marketing Strategies of Apple Mac Computers

differently if they hope to recapture a greater market share in the PC market. CHAPTER 1: INTRODUCTION Apple Computer Inc. and M...

Elementary and High School Virtual Computer Field Trips

of Blooms taxonomy had the assignment not limited their access to the Internet. These outcomes were not uniform for all ind...

Adaptable Intellegence User Interfaces and Human Computer Communications

entertainment gained tremendous momentum over the next five years and the number of users increased dramatically. By the late 199...

Comparative Analysis of Java and C++ Computer Programming Languages

In nine pages this paper compares Java and C++ programming languages in an evaluation of which could be better applied to a corpor...

Financial Analysis of Apple Computer

This paper is written in the form of a fictitious letter from Apple CEO Steve Jobs to a prospective stock holder. This five page ...

Computer Failures and Disaster Recovery

and made a disaster recovery plan for if the computer suffered blackout time this would not have been a problem of the same magnit...

Dell Computer Corporation

The writer examines some of the reasons for the success of Dell, including brand recognition. The paper is three pages long and th...

Computer Science's Shifting Paradigm

they became more common and more accessible. Shift of Paradigm A favorite saying of Mary...

Micro Computers and Their History

In five pages the microcomputers' history from the 1970s to the present day is considered in a time line of changes and important ...

eCommerce Strategy of Dell Computer

In sixteen pages Dell's ecommerce strategy is examined in a direct distribution business model discussion. Fifteen sources are ci...

Development of Computer Software

In ten pages this research paper contrasts and compares third party outsourcing of software application design as opposed to doing...

Overview of the Uniform Computer Information Transaction Act Law

An overview of this proposed law and its impact on America's corporate sector and consumers are presented in a paper consisting of...

History of the UNIX Computer Operating System

various programs written by many companies to distribute information between multiple computers within the network. This minimize...

Reviews of Articles on Various Computer Subjects

In four pages article reviews of approximately two paragraphs each consider such varied topics as robotics, software policy, Inter...

Brief History of Computer Operating Systems

In five pages this research paper discusses OS in terms of history and through a comparative analysis of MS DOS and UNIX. There i...

Espionage and Computer Hackers

In ten pages the modern technological world is examined in terms of the dangers posed by espionage and hackers. Five sources are ...

Computer Gambling and Marketing Campaign Management

In five pages this paper discusses how to creatively and successfully market Internet gambling casinos in the United States in a p...

Carol Gould's Edited The Information Web Ethical And Social Implications Of Computer Networking Reviewed

In five pages this essay compilation first published in 1989 are reviewed in a consideration of information abuses and the importa...

Future Education and Computers

In ten pages future education is contemplated with a discussion of case studies and consideration of such topics as interactive me...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Super Computers Inventor Danny Hillis

In five pages the history of supercomputers, their inventive creator, and their current uses, are examined. Three sources are cit...

Computer Music and its Social Effects

This paper discusses how digital or computerized music and its technology have significantly affected society in five pages. Four...

Computer Technology and the Accounting Profession

In this paper containing six pages different areas within the field of accounting are considered along with the contention that qu...