SEARCH RESULTS

YOU WERE LOOKING FOR :Essays on Computer Management

Essays 1411 - 1440

Ethical Issues and Computers

workings of a computer hold as much interest for hackers as the workings of a 57 Chevy do for the car fanatic. This interest is ...

English Language Instruction and Computers

which parts of a computer programme are the most effective at helping students learn English and should result in a model of the r...

Market Demand Forecasting and Marketing Simulation I

worth everything theyve directly paid for it. That was the leading reason for keeping the price lower than it could have be...

Changes in the Personal Computer Industry

radical growth was between 1995 and 2000 (Canter, 2005). The surge in entry occurred much earlier between 1974 and 1984 (Canter, 2...

Report Compilation in Criminal Investigation

course, depends on the specifics of the crime. Some of the types of observations that might be made are expected and others are s...

Article Analysis/Evidence-Based Practice

study also examined the availability of information resources available to the RN respondents (both at work and at home). Their fi...

GIS Case Study

given regarding the way the system work, if we look at the inputs, the transformation process and the outputs we can consider the ...

The Use of Computers in Online Education

may decide to spend some years traveling in their twenties and work late into their seventies or eighties. Conversely, they may de...

The History and Development of Computer Aided Design

the CAD programs that were designed with engineering application, such as the automotive and aeronautical industries where there w...

General Insurance Company Case Study

This 11 page paper looks at a case study supplied by the student, describing the current manual information systems that are in pl...

Production of a Single Commodity

catches on, can make or break a technology company in a short amount of time" (Value chains, 2006). Companies that are going to ke...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

Society, Young Adults, and Computer Technology

is either because they cannot afford computer technology. In other cases, however, it might be explained as being due to the fact ...

History of the Modem

leased lines they used cost a fortune (Whelan et al, 2006). The modem has been around for a long time, since the old Teletype days...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Claims Processing and IBM and EDS Affiliated Computer Services

are from magazines and journals. The Internet, used properly, is a sound and reliable resource, as long as researchers remember t...