SEARCH RESULTS

YOU WERE LOOKING FOR :Customer Services and the Computers Impact

Essays 1291 - 1320

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

The Impact of Workplace Design on Productivity and Efficiency

power and that workers with this discretion would under work and using the control which they gained to their own advantage (Huczy...

HIV/AIDS in Florida

informs the patient on the various options available to them for aiding their own recovery and return to health. Many of the manag...

A Case Study of a Fictitious Firm

and authors Deal & Kennedy (2000) warn that companies should consider the human factor when making changes. In the long run, it do...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

An Analysis of Weed and Pest Biocontrol Strategies

Biocontrol strategies vary considerably in their effect. They also vary in their overall impact on the environment. This ten pa...

Factors Leading to Urban Sprawl

This 8 page paper discusses some of the factors that lead to urban sprawl. The writer argues that urban sprawl can have a negative...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...

Methods of Computer Storage

This paper consists of fifteen pages and examines the latest technology involving methods of computer storage with solid state sto...

Computers a Household Necessity

taxpayers produce myriad receipts for purchases and expenses, it generally will blindly accept any self-designed spreadsheet of ho...

ARP Protocol Subversion and Network Security

an Internet browser, some type of an email program, or other kinds of programs that can gather information from a particular Inter...

Personal Computer Problems as a Sample Essay Narrative

would help me become a self-employed entrepreneur, and the tasks that used take me hours complete would now be simply a matter of ...

EU and UK Law Applied to Case Study Involving Faulty Goods' Sale and Pregnancy Discrimination

In a paper consisting of twelve pages and three parts EU and UK law applications are examined in terms of territorial arrangements...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Equations for Financing

answer is based on the assumption that the total of the funds received from the sale of the debt is greater than the dividends pai...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Options for Addressing the Problem of Juvenile Crime

houses between the juvenile leaving the correctional system and reentering the community. Juvenile delinquency is just one ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...