SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Science Terms

Essays 1381 - 1410

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

UNIX vs Windows In Terms of File Processing Functions

glitches and program sequence testing, analysis and correction in the programming process before the software can be released. Obj...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

U.S. Congress Term Limits

no limit on the number of terms a person may serve in the House" (American Elections, 2004). The first argument, there is littl...

Senior Citizens and Long Term Care

Nursing homes have changed for the better over the years, but they still carry a negative connotation and generally only those who...

Short Term Change Management and Boeing's 7E7 Dreamliner

a "super-efficient airplane" that s being designed not only by Boeing, but also by other international aerospace companies as well...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Contrasting and Comparing Church, Synagogue and Mosque in Terms of Practices and Beliefs

to the very essence of church worship, bringing forth "the power to speak to our heart" (Holladay, 2004). Sitting at pews and sur...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

3 Corporate Marketing Questions Answered

differences and similarities do you see between domestic marketing and international marketing at Encyclopedia Britannica Inc.? ...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

Computer Attacks and Internet Security

The company was the victim of a "classic Distributed Denial of Service (DDoS) attack generated by the coordinated efforts of many ...

Society, Young Adults, and Computer Technology

is either because they cannot afford computer technology. In other cases, however, it might be explained as being due to the fact ...

Selection of Management Information Systems

However, it may be more beneficial to use a stand-alone application which is designed specifically for e-mail. These stand-alone ...

Claims Processing and IBM and EDS Affiliated Computer Services

are from magazines and journals. The Internet, used properly, is a sound and reliable resource, as long as researchers remember t...

Applying Economic Term Definitions to Health Care

period. It is determined by a number of factors including income, tastes and the price of complementary and substitute goods." In ...

History of the Modem

leased lines they used cost a fortune (Whelan et al, 2006). The modem has been around for a long time, since the old Teletype days...

English Language Instruction and Computers

which parts of a computer programme are the most effective at helping students learn English and should result in a model of the r...

Market Demand Forecasting and Marketing Simulation I

worth everything theyve directly paid for it. That was the leading reason for keeping the price lower than it could have be...

Claims Processing Outsourcing

of shifting/delegating/transferring a service/process/function to a third-parties/external service provider which would otherwise ...

Interdisciplinary Enhancement Through XML

concept focus" (Reksten , 2000, p.26). On the other hand, multidisciplinary learning lacks a concept focus but "relate to facts a...

Computer Software and Hardware Purchasing

the DRU-810A Double Layer & Dual Format DVD Burner that is manufactured by Sony and sells for $61.95 ("PCCConnection," 2006). Wh...