SEARCH RESULTS

YOU WERE LOOKING FOR :Evolution of Computer Technology

Essays 1261 - 1290

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

The Coco Store Website's Interface Design

taking advantage of users intuition and prior experience. Background information What is a human-computer interface? In regards ...

The Coco Store and HCI Theory

includes the perceptions and reactions of the reviewer. Biological and cognitive basis for perception According to Greenberg (19...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

International Law and Commerce Issues

Federal Trade Commission, established in 1914 during Woodrow Wilsons term as President (Federal Trade Commission: A History, 2004)...

Election Process Impact of Computers

willing to give. "The chief problem with paper is that it takes too long to count thousands or millions of ballots. We are just ...

Computer Law Understanding and the Significance of System Administrators

act maybe hard for the system administrators as it is lengthy, with 75 sections and a total of 16 schedules. However, this...

Classrooms, Technology, and Teacher Education

may inevitably have to use. The Problem Statement Increasingly, the use of microcomputers in the classroom setting has bee...

Interdisciplinary Perspective on Philosophy

In five pages this research essay examines how the disciplines of computer science, scientific method, psychology, sociology, art,...

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Chiropractics and Radiology

In five pages this research paper examines how chiropractics will feature radiology in the future in a consideration of digital an...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...

Dinosaur Behavior Determination

thoroughly studied (DiChristina). Careful field research is critical to understanding dinosaurs but it alone doesnt give us much ...

Comparison of the Inventions of Computers and Trains

This essay consists of fifteen pages and considers whether the computer or the train was the more significant invention in terms o...

Computer Domains, Software, and Selection Critera

Computer domains are the subject of this paper consisting of two pages along with the various types of equipment required in order...

Channels of Direct and Indirect PC Marketing

In a report consisting of fifteen pages this paper evaluates the pros and cons of the direct and indirect channels of marketing em...

Ethics of Global Computer Laws

Extending that metaphor one step further, Katsch (1995) comments that the invasion of legal spaces by cyberspace, however, goes be...

Individual Privacy and Computers

for consumption by the government, organizations, companies and a whole host of other mediums where computers are utilized to tran...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Manufacturing and the Airline Industry

In thirteen pages this paper considers various aerospace and aircraft manufacturing methodologies as well well as the effects of c...