SEARCH RESULTS

YOU WERE LOOKING FOR :Consideration of Computer Technology

Essays 991 - 1020

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

CAT and SISP - A Review of 2 Articles

evaluation may be useful (Thompson and Weiss, 2011). Once first stage is complete, and the determination that CAT is suitable, the...

IWB-Latest technology for Schools

of programs and resources but there is still evidence that teachers are not using them to their full potential. One of the reasons...

Making Better Decision than Joe Schmoe

Joe Schmoe was a marketing manager for Clipboard Tablet Co. His decisions for three hand held computer ranges between 2012 and 10...

Analysis Two Major Computer Companies

a dictator. All final decisions were made by him, just like Jobs and like Jobs, he was a micromanager. Dell believed that good pla...

Memorandum on Computer Security

XP commands "netstat" and "tasklist". By running these commands, one can swiftly access critical information about the processes r...

Computer Tools and Inappropriate Prescribing for the Elderly

The incidence of inappropriate medication prescriptions issued to elderly individuals is estimated to be between 12 and 40 percent...

Media Convergence and the Computer

et al, 2003). In regards to issue that the computers convergence with television as a media tool is often considered the most infl...

Gary Hamel's Leading the Revolution

In seven pages this paper discusses this text in terms of achieving greater insights into GE's CEO Jack Welch and Dell Computer CE...

Computer Network Logical and Physical Designs

computer (Cardiff University, 2003). These configurations rely on the network "neighborhood" for relay of data as well (Cardiff Un...

Crimes Committed by Computers

The Comprehensive Crime Control Act was created as a means by which to provide Secret Service with legal influence over both compu...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

Fortran Computer Programming Historical Overview

Visual program, his brother William went a step further by using the same computer (TX-2) to create a data flow language(Najork). ...

Programming Language Learning and Teaching in a Multimedia Environnment

People can now in fact learn how to program with the use of multimedia. McMaster (2001) explains that if managers want their sal...

Developmental Psychology and a Premier Virtual Computer Generated Symposium

labeled and controlled by drugs, something that alleviates the difficulties for the teachers and parents, but has unknown latent e...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Contemporary World and Adult Self Directed Education

most dynamic approaches to the systematic collection of knowledge in an environment in which that knowledge is collected with the ...

Learning Center Ideal

socially. The greater the overall interaction the better the prospects for economic improvement (Lewin-Epstein et al, 2003). Onc...