SEARCH RESULTS

YOU WERE LOOKING FOR :Evolution of Counting Systems

Introducing Technology - Smoking Cessation Program

This is a followup paper to a proposal to implement a smoking cessation program in a mental health hospital. In this essay, a heal...

Electronic Medical Records, An Analysis

This research paper describes the factors that hospitals purchasing an electronic medical records (EMR) system. Fifteen pages in l...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Survey Project, Importance of Creativity

This essay relates the details of a proposed survey study that focuses on the importance of teaching creativity/critical thinking ...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Penal Injustices and Morality Theory

This paper contends the US prison system is a moral hubris and deserved of significant ethical reform. There are three sources in...

Chapter 9, Forensics Handbook, An Analysis

This paper discusses the five-stage model developed by the Vera Institute, which describes the process used to enter adolescents i...

Proposal Hospital Implement Electronic Management

Information technology plays a major role in mitigating different issues such as increasing demand, constrained resources, continu...

Barberi Scandal, IG Investigation

This paper offers an overview of an investigation that was conducted by the Inspector General's office regarding hiring practices ...

The Potential Benefit of FDI from China to Africa

Africa is one of the world's poorest regions. It has been argued that one strategy which is useful for economic development to all...

Neurolinguistic Programming A Brief

This essay describes the basic aspects and foundations for neurolinguistic programming (NLP). It explains how having different sen...

Taxation Comparison

In a paper of three pages, the writer looks at systems of taxation. Value added taxes are compared with income taxes. Paper uses t...

Asperger Programs, A Letter to the Editor

This essay presents an argument that there should be specific programs in the public school system that are designed to meet the n...

Neurotoxicity

This research paper uses a case study as background and addresses the topic of neurotoxins, focusing on Anatoxin-A and Saxitoxin....

Deontological and Teleological Ethics, Difference

This essay offers a discussion of the difference between teleological and deontological ethics, especially in regards to law and t...

Liberian School Administration and Supervision

This research paper discusses the educational system and history of Liberia. Seven pages in length, a one page questionnaire is i...

Crisis and Change at Toyota Motors

In 2013 Toyota Motors adopted a new organizational structure to enable changes in the firm to overcome the problems of the past. T...

Toyota's Mistakes

There is a lot to learn from the mistakes Toyota made when their cars suddenly accelerated. In terms of ethical leadership they di...

Theory Utilization, Betty Neuman

This research paper describes how an advanced practice nurse used Neuman's systems model and assessment tool to aid in developing ...

Prison Overcrowding

This research paper pertains to overcrowding in prisons and asserts that this constitutes the most significant challenge facing th...

Importance of Value-Based Educational Instruction

This research paper pertains to the significance of values-based instruction within the public school system. Four pages in length...

Novell NetWare 4.11 and Microsoft Windows NT 4 Integration Tools Compared

In eight pages this report compares the two primary network operating systems. Ten sources are cited in the bibliography....

Workplace and IT

In fifteen pages 3 sections designed to answer student posed questions regarding information technology and the workplace includes...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Tactics to Minimize Computer Crimes

'Cracking' and 'hacking' are among the topics discussed in this examination of computer systems and unauthorized access consisting...

Criminal Justice and the Role of Technology

In six pages this paper examines how criminal justice has benefited from technology in a consideration of various systems, analyti...

Future Education and Computers

In ten pages future education is contemplated with a discussion of case studies and consideration of such topics as interactive me...

Television's On Demand Video

for small audiences (OBrien). Transport Standards Video on Demand is supported by two major systems...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Microsoft NT 4.0 and Hackers

In seven pages this paper offers a technical consideration of how Microsoft Proxy 2.0 and Microsoft NT 4.0 can be attributed to th...