SEARCH RESULTS

YOU WERE LOOKING FOR :Field of Computer Graphics

Essays 31 - 60

Technology and Minorities

In five pages this paper examines the field of technology and the biases that impact upon the involvement of women and blacks....

Elementary and High School Virtual Computer Field Trips

of Blooms taxonomy had the assignment not limited their access to the Internet. These outcomes were not uniform for all ind...

Ceramics and Computer Technology

product classifications and in 1974, the U.S. market for the ceramic industry was estimated at $20 million (2003, p.PG). Today, th...

Description and Occupational Outlook of Computer Programming

In six pages the field of computer programming is examined in terms of its duties, salary, risks, and future occupational outlook....

Ethics Awareness Inventory

also something that is easily masked. Bad people can appear good and vice versa. Making a determination about an individuals tru...

Alan Turing: Life and Accomplishments

"whether accordingly it could be released from matter by death" (Hodges, 1995). These reflections led him into concepts of 20th ce...

Automobile Manufacturing and Computer Vision Solutions

cold-heading and forming process that can produce multifarious quantities at competitive prices with rapid delivery speeds. Moreov...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Women in Computers

This paper consists of six pages and discusses female pioneers in the field of computers in a consideration of Grace Murray Hopper...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Why Study Computer Crime?

damage caused by incidence of computer crime. This includes virus attacks, spam, worms, denial of service (DOS) attacks or other ...

International Relations and the Feminist Perspective

feminine, both viewpoints should be represented if balance is to be achieved (Tickner, 1988, p. 429). Morgenthaus second principl...

Cognitive-Behavioral Family Therapy

This essay has attempted to provide a strong background in marriage and family counseling by reporting a brief history, the needs ...

Family Therapy Two Models

This essay discusses two major family therapy theorists, each of whom was an innovator in the field. Satir is credited with establ...

Industrial Organizational Psychology

1921, James Cattell founded the Psychological Corporation for the purpose of advancing psychology and promoting its value in indus...

Forensic Science—A Good Career Choice

applicable) with my desire to serve the public through a career that is part of the justice system that specifically deals with la...

Environmental Toxicology

of exposure (i.e., inhalation, dermal contact, or ingestion) on different test animal species (i.e., rats, mice, etc.) affect the...