SEARCH RESULTS

YOU WERE LOOKING FOR :Education and Computer Uses

Essays 241 - 270

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

The Importance of Computers in the Food and Beverage Industry

numbers, or planning, computers can assist management in a variety of things. Not only is management provided with advantages with...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Commercial Environment and Computer System Implementation

In eight pages a case study is used to discuss the problems involved in the development and implementation of a business computer ...

Aviation Safety and Computer Simulation

real-time computing is essential within military aviation systems. The ongoing threat of global discord warrants military utiliza...

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....

Dell - A Case Study

U.K. and Canada, and the company is aggressively pushing into Asia and Europe (Gibbs 35). The role of formal knowledge in develop...

Case Study on Decision Making

the different aspects will be considered, rather than a single item gaining a disproportional relevance. Question 2 After readi...

Twenty First Century Computer Counseling

In nine pages this research paper discusses therapy, counseling, and how computers are being used with a consideration of such pra...

Analysis of an Advertisement Featured in Time Magazine II

In two pages this paper discusses an IBM notebook computer advertisement featured in a Time Magazine issue in an analysis of the p...

The Significance of Computer-Aided System Engineering Tools

The writer describes the use of computer-aided system engineering (CASE) tools and their significance for business. The writer arg...

Business World, Computability, and Machine Languages

the work, or the game, or the information beyond the commands and the toolbars. He or she knows the limits of what the computer c...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Types of Computer Programming Languages

of that market. The very first programming languages, back in the...

Field of Computer Graphics

Computer graphics are defined along with a discussion of its business and entertainment uses in a research paper consisting of fiv...

Technology/Hospitality Industry

aided both brands in achieving the goal of operating more efficiently, as hotel management can now run the properties more effecti...

Computer Network Security: Security Devices

visited the most" (Surfing the Internet on-board the Web, 1995). Having this information allows these companies to create a target...

Computer Assisted Design as a Tool in Organizational Communication

an excellent tool which free the architect/artist/creator a broader area of time and space to develop an appropriate solution to a...

Nanotechnology: Role In Speeding Up Computers

every aspect of human life. There is no denying the computers very presence has drastically altered mans existence since it came ...

Adult Learning Styles, Temperaments And Theories In "Educating Rita"

a person and requires the individual to participate fully and completely in the experience. The first segment of the Kolb Model -...

Northern Africa and Dell Computers' Marketing

In five pages this paper examines Morocco as an attractive marketing location for Dell Computers in a consideration of its environ...

Computer Aided Manufacturing and Computer Aided Design

computer aided design occurred as a result of the progression of modern computer systems. Researchers argue that early computer s...