SEARCH RESULTS

YOU WERE LOOKING FOR :Computers and the Law

Essays 961 - 990

Social Revolution and Computer Technology

has been characterized by a constant stream of evolving products, innovative methods of production, and dynamic means of distribut...

Financial Report Information on Apple Computers, Inc.

Fourth quarter 1999 through third quarter 2001 reports are utilized in this five page financial analysis of Apple Computers which ...

Workplace VDUs and Safety Issues

Using computers of course does also warrant care and attention to ergonomics. There are many complaints that stem from sitting in ...

New Software and Computer Purchaes

In eight pages this paper examines the prices and capabilities of antivirus software and computers in a consideration of the Sys P...

Advent of WebTV

This paper considers how little in the way of computer knowledge is needed to use WebTV in eight pages. Seven sources are cited i...

Types of Computer Programming Languages and Basic Information

In five pages computer programming language types such as object oriented, imperative, logic, and functional are discussed. Four ...

Computer Use and Learning Principles

In five pages this report discusses how basic learning principles can be applied to using a computer. Five sources are cited in t...

Computer Industry Development and the Invention of Printed Circuit Boards

This paper examines the impact of the printed circuit board invention upon both contemporary society as well as the computer indus...

The Handheld Electronic Device

A proposal for a palm computer that contains cellular phone service is discussed in the context of this ten page paper that includ...

2001 COBOL

In a paper consisting of ten pages the COBOL computer programming language is considered as of 2001 along with speculation as to w...

BUSINESS CONTINUITY PLAN: DATA PROTECTION

In a previous paper, the writer pointed out that illegal intrusion into a database - whether physical or via Internet - is a huge ...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

Acer Computers: A Case Analysis

research available. By conducting a case analysis, one is able to delve deeply into a topic, identifying not just the superficial ...

Introduction to Psychobiology

the brain waves. Electrodes are places on the scalp and a machine picks up the shape and types of waves, e.g., alpha waves or beta...

Computer Based Crime Reporting

enforcement agencies are faced with the complex problem of having not just to apprehend criminals but also to report what they hav...

Performance and Outlook of Apple Computers

a friend had created the silicon chips on which the Apple Computer would be based, but they at first had no idea of how the chip c...

Computers and Reading Skill Improvements

in the classroom are beneficial to improving reading skills. The paper also provides a brief section which discusses two particula...

Comparison Between Compaq, Gateway, and Dell

* Speed = 1 GHz * RAM = 192 MB. * Hard Drive = 20 GB * Diagonal Screen sizes 15 inches * Installed Operating System = Windows Mill...

A Revised Computer System and the Problems of Audio Visual Corporation

cut down on extra time and money the company did not need to be spending. In order to eliminate these wasted resources, Audio Vis...

Computer System Life Cycle Development and Testing

are overwhelming (pp. 8). Fournier explains that key steps in a testing process generally include GUI testing, unit testing, int...

Leasing Information Technology Equipment Benefits and Costs

of limited resources and a need to maximise the resources that are available leasing can also be seen as providing some benefits. ...

Issues of Computer Security

Carroll (1995) makes the point that whilst it is possible to establish a reasonable amount of security on the Internet, the way in...

Replication of Data

is stored on computers within an organization would be a total nightmare; the business would be virtually unsalvageable in some ca...

UK's Policy on Technology

as well as medical miracles. Technology affects everyone and many industries. In honing in on a few major ones, Britains policy ma...

Human Learning and Computer Technology

heavy reading and/or composition requirements. When third grade students are able to apply the touch-type method of keyboarding, ...

Computer Manufacturing and Job Costing

* There are assembly costs to combine the chips and wafers and put them on the motherboard. This costs $10 per hour and requires 5...

Workplace and Introduction of Technology

place on a daily basis such as: short term billing, long term leasing, invoicing, initial processing of customer information and v...

The Computer Giant Apple

John Scully, who was CEO of Apple at the time, made a devastating mistake (Dohrman, 1997). In 1985, Scully confronted Bill Gates, ...

A Computer System and Purchasing Tickets Online

In five pages the ways of buying movie tickets online and the types of web pages, navigation, design and links needed to create su...