SEARCH RESULTS

YOU WERE LOOKING FOR :Computer System Security Types

Essays 1861 - 1890

Year 2000 Computer Crisis

mayhem in the world. Most computer programs have a two-digit date field, thus when the year 1998 is keyed in, the computer reads o...

Nuclear Power and India

In fifteen pages this paper discusses India and nuclear power in a consideration of national security issues and Hindu nationalism...

Y2K, the Year 2000, and Thereafter

Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...

Role of Management in Avoiding Y2K Catastrophe

In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...

Indochina's Hotel Management

In six pages this paper discusses advertising, security, personnel and management training as each topic pertains to Indochina hot...

Study on Korea's Market Attractiveness

In eight pages this paper examines the appeal of the Korean market for importing computer software. Six sources are cited in the ...

Corporate Vision and Apple Computers

is, "a launch-pad for a concentrated and coherent campaign to mobilize people, first to get excited about the vision -- and then t...

Employee Monitoring Through Computer Software

In five pages this paper argues that employers utilizing computer software to monitor employee emails and usage of the Internet is...

Movie Advertising and Placement of Products On Screen

In nine pages this paper considers how products benefit from being placed on screen in television shows, computer games, and films...

Workplace and Transsexual Issues

that the European Sex Discrimination Act will be rewritten to specifically address the concerns of transsexuals in the workplace. ...

Importance of Literacy in the Workplace

more and more apart. In the 1990s, one fact that has become painfully apparent is the role of literacy in dividing society into a ...

LAN Computer Network Construction

In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniq...

Digital Radio Developments

their shapes and forms, which is why there is more background noise and interference with their transmissions. Two other ...

Societal Impact of Computer Technology

In five pages the destructive societal implications of computer technology are argued. Five sources are cited in the bibliography...

Twenty First Century Business

In five pages the ways in which a hypothetical small business can grow in the twenty first century are discussed and include exami...

Overview of the Internet and Marketing III

In ten pages this paper examines Internet marketing in a consideration of what it is, how it takes place, and its benefits with on...

Word Processors and Marketing Campaign Management

In six pages the fictitious 'Speak Your Mind Version 1.0' product that would allow computers to literally be spoken to by word pro...

Increasing Laptop Sales Overview and Marketing Plan

In five pages this paper examines how laptop computer scales can be increased through marketing techniques and plans with a sample...

Turkey and the Marketing of Computer Hardware

that a number of other entities will also recognize the opportunity, as well. II. TRANSPORT BARRIERS FOR PRODUCT Computer hardwa...

Workplace Productivity Increased by Palmtop Computer

This paper consists of nine pages and presents a fictitious proposal writing sample that argues to a corporate board how palmtop c...

Germany and the Marketing of Computer Hardware

third largest, and accounts for somewhat more than one-fourth of the European Unions GDP. According to BusinessEurope (1998), amon...

A Feasibility Study of Marketing Economics in Spain

This paper examines marketing concepts pertinent to a multinational computer company entering into business in Spain. This ten pa...

Internet, Public Documents, and Government Control

In fifteen pages this paper discusses the Internet and how the government has endeavored to control public document assess in the ...

Don Tapscott's Promise and Peril in the Age of Networked Intelligence

The 'digital economy' is the focus of this paper consisting of five pages with computer networking's advantages viewed within the ...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...

Overview of Dell Computer Company

In eighteen pages the rise of Dell to the leading personal computer manufacturer is documented with an examination of the current ...

Corporate Overview of Gateway and Dell Computers

In twenty pages this report provides an overview of each computer giant along with an analysis of market positioning, ratios, and ...

Proctor and Gamble Communication and Management Issues

its category in Europe for all of 1997, and the company achieved that record in the face of intense competition for the market (Mi...

Societal and Workplace Impact of Computers

COBOL, PL1, RAMIS, FORTRAN and many others. While some languages have survived the PC revolution, many languages have become obsol...

Decisions and Data Warehousing

In ten pages this research paper discusses decisions made in information storage and data warehousing with a definition of data wa...