SEARCH RESULTS

YOU WERE LOOKING FOR :Computers and the Use of Natural Language Processing

Essays 451 - 480

Authors and Resource Validity

results of a survey revealed that 66 % of teachers used their computers "a lot" for classroom instruction, and 39 % frequently use...

Computer Advantages and Disadvantages

In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources ...

Technology Questions

In five pages a Q and A format is used to answer 2 questions posed by a student regarding health care professionals and the import...

Small and Medium Business Accounting Information Systems

In this five page paper the impact of accounting systems on small and medium sized businesses are assessed with such issues as the...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Computer Use and Learning Principles

In five pages this report discusses how basic learning principles can be applied to using a computer. Five sources are cited in t...

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....

Dell - A Case Study

U.K. and Canada, and the company is aggressively pushing into Asia and Europe (Gibbs 35). The role of formal knowledge in develop...

Aviation Safety and Computer Simulation

real-time computing is essential within military aviation systems. The ongoing threat of global discord warrants military utiliza...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Field of Computer Graphics

Computer graphics are defined along with a discussion of its business and entertainment uses in a research paper consisting of fiv...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Cross Curriculum Pros and Cons of Computer Usage

In fifteen pages this paper discusses elementary education and the uses of computers in a consideration of pros and cons. Twenty ...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...