SEARCH RESULTS

YOU WERE LOOKING FOR :Employers Monitoring Computer Use

Essays 1171 - 1200

Source Citations from the Internet

In five pages this paper examines how sources from the Internet should be cited when used as references....

Katherine Anne Porter's 'The Jilting Of Granny Weatherall'

her mother does not always know the time of day. "He just left five minutes ago"; "That was this morning, Mother. Its night now" ...

C.S. Forester's Mr. Midshipman Hornblower

In five pages this novel's imagery uses are analyzed. There are no other sources listed....

Homeopathic Remedies and Concepts Discussed

In fifteen pages this research paper considers homeopathy in terms of history, relevant concepts, uses of remedies and their age g...

Irony in Of Mice and Men by John Steinbeck

In three pages this paper discusses how irony is used by John Steinbeck in Of Mice and Men....

Creative Short Story Romance

In five pages this paper presents an original short story romance which is followed by an explanation of the narrative form used....

Vocabulary and 'Power' Words

one may offer "From a thematic perspective, Shakespeares Romeo and Juliet was a traditional love story, yet the storys plot weaved...

Overview of Experimental Economics

In five pages the contemporary world's utilization of experimental economics is examined in this overview of its history and varie...

Determining the Safety and Effectiveness of a New Anti-Cancer Agent

epitope using an IgG antibody from a breast cancer patient. This epitope, KASIFLK, is one expressed preferentially by breas...

The Deleterious Effects of Computer Gambling

are admitted sex addicts and "shopohaulics." No one would want to outlaw shopping or sex, but of course, sex and shopping are regu...

Computers in the Classroom

the classroom generally will demonstrate that integration of the net does lead to a rise in access to information (Castellani, 200...

Critique of "Computers in Clinical Assessment: Historical Developments, Present Status, and Future Challenges"

which can be found in various forms scattered all through the Internet. "Overall, there is greater potential for resistance...

The Computer In Criminalistics

connect him or her to a particular cyber crime. Indeed, policing tactics have vastly improved over the years to include such aspe...

How Computer Software Can Help the Real Estate Appraiser

used today. A lawyer who has property management experience may hone in on particular problems not picked up by todays new types o...

Speech Recognition as a Tool for Human and Computer Interaction

were made in the 1950s, in fact. Bell Labs, for example, developed the capability within the telephone industry to recognize spok...

Strategic Initiatives in Digital Media: Apple Computers, Inc.

that can do no wrong. Once a distant second in the home computer market that was facing irrelevancy as big-box companies like Dell...

Revenue Assessment and Projected Income Statement for Micro Chip Computer Corporation

one year of improvement this is unlikely to be accurate. Tools such as regression analysis may also be used, this looks at previou...

Apple Computer Innovations

for Apple products. The Xcode developer is the most used. Apple says this is tightly integrated with the Cocoa and Cocoa Touch fra...

COMPUTER-GENERATED IMAGERY AND ITS IMPACT ON FILM ANIMATION

the 1980s, animation techniques came in two versions: Drawn and model (also known as stop-motion) (Mitchell, 2002). Cel animation ...

Micro Computers and Their History

In five pages the microcomputers' history from the 1970s to the present day is considered in a time line of changes and important ...

Computer Science's Shifting Paradigm

they became more common and more accessible. Shift of Paradigm A favorite saying of Mary...

eCommerce Strategy of Dell Computer

In sixteen pages Dell's ecommerce strategy is examined in a direct distribution business model discussion. Fifteen sources are ci...

Development of Computer Software

In ten pages this research paper contrasts and compares third party outsourcing of software application design as opposed to doing...

Espionage and Computer Hackers

In ten pages the modern technological world is examined in terms of the dangers posed by espionage and hackers. Five sources are ...

Computer Technology and the Accounting Profession

In this paper containing six pages different areas within the field of accounting are considered along with the contention that qu...

Comparative Analysis of Computer Industry Giants

In five pages Compaq, Dell, Gateway, IBM, and Hewlett Packard are compared and examined in terms of a five year forecasting of est...

Computers and HR Training

In about twelve pages this concept paper discusses manufacturing and the effectiveness of interactive training with the use of CDs...

A Fiscal Investigation of Apple Computer, Inc.

In ten pages this research paper conducts an Apple investigation that includes financial reports, company setbacks, SWOT analysis ...

Computer Problems and Concerns Resulting from the New Millennium Transition

In six pages this paper presents an overview of Y2K that considers problems, issues, theories, and preventative measures. Five so...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...