SEARCH RESULTS

YOU WERE LOOKING FOR :Examination of Computer Viruses

Essays 601 - 630

eCommerce Strategy of Dell

In five pages Dell's corporate rise within the personal computer industry is assessed in terms of its ecommerce strategy. Four so...

Global Marketing of Computers

In five pages a United States' computer retailer is considering expanding operations to Morocco and this paper presents a marketin...

Computer Advantages and Disadvantages

In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources ...

P2P Connections, Grid Computing, and Their Impacts

In five pages this paper discusses how the future of computers has been impacted by P2P connections and grid computing. Ten sourc...

An Overdoes of Intravenous Medication and a Change Theory Application

while in the hospital plus the incidence of symptoms and/or disease that would have initially required use of the medication. In ...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Computer Design Evolution

In five pages this paper examines how design and art were influenced by the evolution of computers. Four sources are cited in the...

Strategies of Retail and Shopping

This paper consists of three pages in which retail and shopping strategies in times of globalization and computer technology are e...

Apple Computer Inc. and Its Organizational Culture

In twenty pages this paper examines Apple Computer Inc. in a consideration of its organizational culture. There are thirty source...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

Y2K Preparation

In seven pages this paper examines how an individual can prepare for the new millennium in terms of computer preparation. Ten sou...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Oil Industry's Changing Technology

In twelve pages this paper examines how the oil industry changed in the 20th century due to such technology as satellites, compute...

U.S. Computer Age

In twelve pages this paper examines the U.S. in a consideration of the social impact of computers. Eight sources are listed in th...

NonProfessionals, Health Education, and Computers

In five pages the applications of computers in community and academic settings are evaluated as they relate to the health educatio...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

Gateway and Dell Websites

In seven pages these two computer manufacturers' websites are evaluated with a brief corporate description provided and then an an...

Nursing and Computers

of first-year nursing courses for delivery on the Internet has afforded students the opportunity to complete didactic requirements...

Maintenance of Computers

cleaned. When computers are exposed to more dust and dirt than a normal computer would be, they should be cleaned more often. In...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

Internet, Computers, and Global Issues

to create problems, while others are out to do damage (Adams, 2000). There is in fact a debate on the ethics of hacking as there a...

Management, Organizational Structure, and National Culture

of Texas, Pan American, 2003). There must be interaction between the two. One author explained: "National culture relates to an in...

Political Sensitivity and Spatial Products

earths surface, triangulating time and distance between one satellite, a position on earth, and another satellite. Reliable cover...

'Strategic Intent' and Company Operations

relentlessly targeted Southwest in demarketing efforts, Southwest not only continued to exist. Eventually, it surpassed all of th...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Prehistorica Computers and Case Study Analysis on eBusiness

programmers may have to work and maintain the site on an ongoing basis. It will likely mean buying new hardware and dedicating a s...

CD Store Suggested Scenario

that at some point we could work or details of individual tasks. This can be built into a database by adding an extra stem or lea...

Description and Occupational Outlook of Computer Programming

In six pages the field of computer programming is examined in terms of its duties, salary, risks, and future occupational outlook....