SEARCH RESULTS

YOU WERE LOOKING FOR :Dealing with Disaster using Computer Networks

Essays 331 - 360

Statistical Methods

to be used depending on hoe many of the variables are dependent and the type of dependence, for example, where only one or more v...

The Use of Computers in Online Education

may decide to spend some years traveling in their twenties and work late into their seventies or eighties. Conversely, they may de...

Overview of Prolog Programming Language

Phillippe Roussel went to Montreal and consulted with Colmerauer on natural languages and in a report he issued that September Col...

Past and Present Unemployment Compensation

only become important over time (Finer & Garret, 1991). When depressions would occur during the latter part of the 1800s, working ...

Topics in Sociology

their breasts enlarged, while Oriental women may have their eyes reshaped, and Jewish and Italian women have rhinoplasty (nose sur...

Harvard Case Study of BMG Entertainment

Record companies relied on radio stations to give their products airplay so potential consumers could hear them and then purchase ...

Research Project Outlining

The method used in this research project is the administration of a survey. This is justified because to answer the research quest...

Antitrust in the 21st Century: Looking at Microsoft

Microsoft was giving away many of its popular products for free through Windows bundles, which it could afford due once again to t...

Background and a Project at McDonalds

the global social concerns have seen the increased use of corporate social responsibility polices, from the use of bio- diesel in ...

Urban Combat Readiness and Computer Simulations

information technology has been growing at an exponential rate. In just a few short years, computers have evolved from large, clun...

Automobile Manufacturing and Computer Vision Solutions

cold-heading and forming process that can produce multifarious quantities at competitive prices with rapid delivery speeds. Moreov...

Sure Thing, a Play by David Ives

rapport between two people (Gaines F4). However, within the course of the play, Ives also makes a scathing reference to the blaze,...

Discussion Questions for the Workplace

responsibilities for the employee, which may require additional compensation of some sort. 2. In any recruitment process, espec...

IWB-Latest technology for Schools

of programs and resources but there is still evidence that teachers are not using them to their full potential. One of the reasons...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Obtaining Information From Theses

contrast, Steward reported a large and comprehensive literature review identifying numerous authors and numerous topics and subtop...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Controversies Surrounding the Ratification of the Constitution

United States political discourse should proceed in keeping with the original intent of the writers of the Constitution of the Uni...

Cultural Analysis in Bourgois' "In Search of Respect"

thematic focus to the text, which is the exploration of the cultural and social forces that led to the development of crack dealin...

Organizational Conflict

Then there are those leaders who practice the avoiding style. They tend to behave as if they were indifferent both to their own c...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Computer Use and Learning Principles

In five pages this report discusses how basic learning principles can be applied to using a computer. Five sources are cited in t...

Authors and Resource Validity

results of a survey revealed that 66 % of teachers used their computers "a lot" for classroom instruction, and 39 % frequently use...

Knowledge Management and Learning in Low Cost Airlines

the use of dynamic pricing. This is a pricing system that is designed to maximise revenues and seat sales. The marginal cost of ca...

Changing Operations - A Case Study

there is a high degree of technological change, with a larger degree of complexity will result in a wider variety of organisationa...

The Financial Crisis and Multinational Corporations

(Wharton University 2009). Some major multinational corporations are living through this economic downturn but they are few and in...