SEARCH RESULTS

YOU WERE LOOKING FOR :Employers Monitoring Computer Use

Essays 181 - 210

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Computer Advantages and Disadvantages

In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources ...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Commercial Environment and Computer System Implementation

In eight pages a case study is used to discuss the problems involved in the development and implementation of a business computer ...

Film, Photography, and Computer Generated Animation

In five pages the uses of animation that is generated by computers in terms of human motion visualization and greater understandin...

Modern Instructional Strategies and Computer Technology

In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on...

Toddlers and Computers

In 5 pages this paper discusses toddlers in preschool and computer uses. There are 4 sources cited in the bibliography....

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

IWB-Latest technology for Schools

of programs and resources but there is still evidence that teachers are not using them to their full potential. One of the reasons...

Statistical Methods

to be used depending on hoe many of the variables are dependent and the type of dependence, for example, where only one or more v...

Urban Combat Readiness and Computer Simulations

information technology has been growing at an exponential rate. In just a few short years, computers have evolved from large, clun...

Automobile Manufacturing and Computer Vision Solutions

cold-heading and forming process that can produce multifarious quantities at competitive prices with rapid delivery speeds. Moreov...

Elementary Education, Computers, and Test Scores

In eight pages this paper considers how using computers in elementary school classrooms produce benefits including assisting stude...

Twenty First Century Computer Counseling

In nine pages this research paper discusses therapy, counseling, and how computers are being used with a consideration of such pra...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...