SEARCH RESULTS

YOU WERE LOOKING FOR :Educational Project on Using Computers

Essays 1711 - 1740

Computer Attacks and Internet Security

The company was the victim of a "classic Distributed Denial of Service (DDoS) attack generated by the coordinated efforts of many ...

Types of Computer Viruses

piggybacks on other real programs is known as a virus (Brain, 2005). For example, a virus could attach itself to a spreadsheet pr...

Overview of the Merger Between IBM and Lenovo

The sharp decline in sales was expected following the turn of the new century as many businesses rushed to replace aging PCs with ...

Aviation Safety and CAD Uses

level of liability on the part of the airline company and the aircraft builders, there is a great deal of motivation to find ways ...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Article Analysis/Evidence-Based Practice

study also examined the availability of information resources available to the RN respondents (both at work and at home). Their fi...

General Insurance Company Case Study

This 11 page paper looks at a case study supplied by the student, describing the current manual information systems that are in pl...

Top-Down Cost Estimating

and total cost is a primary factor. There is nothing new about this concept: even Jesus said, "who would begin construction of a ...

The History and Development of Computer Aided Design

the CAD programs that were designed with engineering application, such as the automotive and aeronautical industries where there w...

GIS Case Study

given regarding the way the system work, if we look at the inputs, the transformation process and the outputs we can consider the ...

Changes in the Personal Computer Industry

radical growth was between 1995 and 2000 (Canter, 2005). The surge in entry occurred much earlier between 1974 and 1984 (Canter, 2...

IT's Quality Culture

goals" (p. 41). The fact is not news to anyone working in IT project management, but its magnitude may be. At a time when busine...

Production of a Single Commodity

catches on, can make or break a technology company in a short amount of time" (Value chains, 2006). Companies that are going to ke...

Project and Stakeholder Management

that need to be looked at, the way that the project will be managed in terms of stakeholders as well as the general stakeholder is...

Computer Comparison and Evaluation Memo

operating system is important as well, but that can be changed and all of the evaluated computers include Microsoft Windows(r) XP ...

Apple Computers and the Information Age

the information revolution is not able to contribute to the development of democratic systems, even though it clearly can offer th...

Notebook Computers

for mobile use and efficient power consumption" (Laptop, 2006). They usually have liquid crystal displays, a built-in keyboard, an...

Apple Computers

over to Mac systems, the ability of Intel chips to be used in iMacs has also helped the movement as well as the increasing realisa...

Don't Bother Me, Mom, I'm Learning by Marc Prensky

unknown 20 years ago (Exclusive interview, 2001). The world has changed dramatically, but education has not kept up with it; in fa...

Don't Bother Me, Mom, I'm Learning by Marc Prensky

medical procedures, work in a lab-in short, the skills developed by the games translate directly into the "real world" (Prensky, 2...

Report Compilation in Criminal Investigation

course, depends on the specifics of the crime. Some of the types of observations that might be made are expected and others are s...

Theory Practice Educational Leadership

the mindsets of subordinates, building trust, and encouraging followers to be leaders (Lulee, 2011). In todays educational system,...

Using Array Structure to Develop a Program

has resulted in more than $10,000 in losses last year, and threatens future budgets for the organization. Therefore, it must be ad...

Proposal for a New Assessment Model Aimed at Analysis of Information Technology Use within a Firm

which an organisation competes. Porter (1985, p13) has designed two differing categories of competitive advantage; cost advantage ...

Using Moving Averages

the demand data from days 2, 3 and 4 and divides by 3. This is repeated for all the days (except the last day as there are not thr...

An Educational Environment of Diversity

Spencer Addressing diversity issues at Louise A. Spencer requires an understanding of the value of diversity, even in the presenc...

Statistical Testing of Criminal Justice Data

the critical level, this the score against which the test statistic will be assessed to determine whether to accept or reject the ...

The Influence of Music on Trahce in African Tradition Religions

The writer presents an examination of the role music plays in trance. The paper looks at both shamanic and possession trance, the ...

Educational Assessments - Formative and Summative

In a paper of eight pages, the writer looks at formative and summative assessments in education. Lesson plans are generated and su...

Description of a HIV/AIDS Educational Intervention

This research paper pertains to Peer Education Classes, which is an HIV risk reduction intervention presented by the New Mexico AI...