SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Science Terms

Essays 931 - 960

Analysis Two Major Computer Companies

a dictator. All final decisions were made by him, just like Jobs and like Jobs, he was a micromanager. Dell believed that good pla...

The Long Term Potential of Groupon and other Group Buying Web Sites for Businesses

The writer looks at the rise of the online group buying discount site in order to assess whether the concerns expressed regarding ...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Psychiatric Technician Must Know These Terms

This essay identifies many of the disorders and conditions a psychiatric technician need to understand. Each disorder or condition...

The Ethics of Term Paper Mills

This paper contends plagiarism is unethical and that it is the student that should be held responsible. There are three sources i...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Technology and its Importance in Business

This paper considers the way technology is at the heart of every business. Computer technology is of particular importance in thi...

Mental Health Services, Long Term Care

This research paper/essay consists of two parts. The first deals with long term care and the second argues that behavioral care sh...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Hypertext

, 2000). Hypertext, when it is combined with the telecommunications revolution, surely becomes the largest change in the way in...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Internet, Computers, and Global Issues

to create problems, while others are out to do damage (Adams, 2000). There is in fact a debate on the ethics of hacking as there a...

Cybercrime

whilst others are not adequately covered. However, when looking at the act and the way in which the internet has developed since t...

Is New Software Negatively Impacting Students' Effectiveness as Readers and Writers?

Indeed, the world suffers from a monumental overpopulation problem that is at the root of many of todays educational problems. Th...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

The Role of the Executive, Comparative Advantage and Terms of International Trade

export by reference to that which has the smallest absolute disadvantage and import that commodity where the absolute disadvantage...

Reading Text: Electronic Versus Paper

This 5 page paper gives an explanation of reading electronic text versus reading hard copy text. This paper includes studies about...

SEABREEZE'S VIRTUALIZATION PROPOSAL

Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...

Political Sensitivity and Spatial Products

earths surface, triangulating time and distance between one satellite, a position on earth, and another satellite. Reliable cover...

'Strategic Intent' and Company Operations

relentlessly targeted Southwest in demarketing efforts, Southwest not only continued to exist. Eventually, it surpassed all of th...

Fortran Computer Programming Historical Overview

Visual program, his brother William went a step further by using the same computer (TX-2) to create a data flow language(Najork). ...

Programming Language Learning and Teaching in a Multimedia Environnment

People can now in fact learn how to program with the use of multimedia. McMaster (2001) explains that if managers want their sal...