SEARCH RESULTS

YOU WERE LOOKING FOR :Development of Computer Software

Essays 751 - 780

LAN Computer Network Construction

In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniq...

Importance of Literacy in the Workplace

more and more apart. In the 1990s, one fact that has become painfully apparent is the role of literacy in dividing society into a ...

Turkey and the Marketing of Computer Hardware

that a number of other entities will also recognize the opportunity, as well. II. TRANSPORT BARRIERS FOR PRODUCT Computer hardwa...

Workplace Productivity Increased by Palmtop Computer

This paper consists of nine pages and presents a fictitious proposal writing sample that argues to a corporate board how palmtop c...

Word Processors and Marketing Campaign Management

In six pages the fictitious 'Speak Your Mind Version 1.0' product that would allow computers to literally be spoken to by word pro...

Increasing Laptop Sales Overview and Marketing Plan

In five pages this paper examines how laptop computer scales can be increased through marketing techniques and plans with a sample...

A Feasibility Study of Marketing Economics in Spain

This paper examines marketing concepts pertinent to a multinational computer company entering into business in Spain. This ten pa...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...

Overview of Dell Computer Company

In eighteen pages the rise of Dell to the leading personal computer manufacturer is documented with an examination of the current ...

Corporate Overview of Gateway and Dell Computers

In twenty pages this report provides an overview of each computer giant along with an analysis of market positioning, ratios, and ...

Films and 3D Computer Graphics

film, it takes many thousands of frames to make even a few minutes of time in the finished movie. The most famous example of thi...

Civil Engineering Applications of Computer Technology

In fifteen pages computer technology is examined within the context of its impact upon civil engineering in terms of operations an...

Y2K, the Year 2000, and Thereafter

Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...

Role of Management in Avoiding Y2K Catastrophe

In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...

What's the Buzz About Y2K?

In this paper consisting of twenty one pages this paper examines the banking industry in an overview of the implications of the Ye...

Year 2000 Problem and its Economic Implications

The problem of panic is directly linked to the perceptions and actions of a number of Y2K alarmists, who have argued that the gove...

Obvious Impacts of the Millennium Bug

This paper examines the various computer problems associated with the date change to January 1, 2000 in eight pages. Eight source...

Computers and the Y2K New Millennium Bug

This paper examines the many computer problems that can result from the Y2K bug upon the year 2000 in five pages. Three sources a...

Year 2000 Computer Crisis

mayhem in the world. Most computer programs have a two-digit date field, thus when the year 1998 is keyed in, the computer reads o...

Computer Consulting Business Startup

In five pages this paper presents an analysis of a computer consulting business startup in terms of financial and research conside...

Case Study on Computer Consulting

In nine pages a case study of CompuGear Inc. is considered in terms of current issues facing a professional computer consulting fi...

Antitrust Regulation and its Direction

In eight pages the direction of the United States' antitrust regulation is analyzed in a discussion of the long distance telephone...

Simplification of the Process of Computer Shopping

In five pages this paper presents a spreadsheet which demonstrates how computer shopping can be simplified. There are no sources ...

1990s' Personal Computer Shopping

In four pages this paper discusses what must be considered in shopping for a personal computer in the 1990s with such topics as IS...

Computers and Buddhism

In eight pages computers and their increasing role in Buddhism adherents' lives are examined in the expanded methods of worship, s...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Comparison of UNIX, OS2, and Windows Computer Operating Systems

In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a c...

CPU Properties and the Performance of Computers

In five pages this paper considers Pentium processors and their differences in a discussion of how computer performance is influen...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...