SEARCH RESULTS

YOU WERE LOOKING FOR :Five Articles on Various Issues Involving Computer Technology

Essays 1801 - 1830

Apple Computer's Organizational Culture

Culture Hofstede, Neuijen, Ohayv and Sanders described organizational culture as the "patterns of shared values and beliefs that ...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Business Ethical Issues Featured in 'The Seductive Danger of Craft Ethics for Business Organizations' Journal Article

we would be proud to describe to our grandchildren, absent the convenient balm of rationalization" (pp. 23). Clearly, decision-ma...

Dell Computer's Corporate History

Dell had reached the opportunity to go public, which occurred in 1988. It was during that year that Dell had as many as six hundr...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

Positive and Negative Aspects of Computers

and dilemmas of computerization really work out for large numbers of people under an immense variety of social and technical condi...

Computers and China

particular market, partly because of culture, and partly because the demand, until recently, simply hasnt been there. Dell Compute...

Dell Computers' Transformation

Dell manufactured no computer that had not been presold. Using payment systems better suited for speed as well, Dell was able to ...

Apple Computer's Leadership Problems

the negative performance he put forth in 2002 (Salkever, 2004). This was a bad year economically for all. It was shortly after th...

History of the Modem

leased lines they used cost a fortune (Whelan et al, 2006). The modem has been around for a long time, since the old Teletype days...

3 Articles on Public Relations Issues Between Schools and Communities Summarized

is all too often overlooked (Ediger, 2001). When courteous responses between school workers is not relayed, the public at large w...

Nurse Practitioner

collaborating physicians name. Authority to prescribe controlled substances includes Schedule II-V as outlined in the prescribers ...

Compaq Computer's Logistics and Quality Management Tutorial

goals for inventory arriving at a warehouse -- and that such inventory be processed in the database within a certain number of hou...

Technology and Women

the higher jobs that the males seem to obtain. This technology gap is addressed in AAUWs report (Wolff, 1999). Still, it is a rath...

Computer Hacking and Ethics

productive. Like having a firewall, these individuals can help people protect their sites from unscrupulous individuals who want t...

Computer Use and Learning Principles

In five pages this report discusses how basic learning principles can be applied to using a computer. Five sources are cited in t...

Computer Based Visual Instruction Materials Designing

more than three small images (2000). In computer presentations, it is important to be consistent in regards to such features as ...

Computer Aided Manufacturing and Computer Aided Design

computer aided design occurred as a result of the progression of modern computer systems. Researchers argue that early computer s...

Dell Computer's Capital Sources

the company needed. Dell is not debt free, but the level of debt it carries is virtually negligible compared to its competitors. ...

Customer Services and the Computer's Impact

In five pages this paper discusses how customer relationship management has been affected by the Internet and computers. Five sou...

Film, Photography, and Computer Generated Animation

In five pages the uses of animation that is generated by computers in terms of human motion visualization and greater understandin...

Overview of the Air Data Computer

In five pages the air data computer is examined in terms of its operations and role in flight crew information relaying. Five sou...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

Northern Africa and Dell Computers' Marketing

In five pages this paper examines Morocco as an attractive marketing location for Dell Computers in a consideration of its environ...

Preschoolers and Educational Software

In five pages preschool and children of early elementary school age are the focus of this consideration of early educational compu...

Animation Generated by Computers

was a Hollywood breakthrough because all visuals were completed through computer animation. "Toy Story" has had the effect of act...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Law and Computer Crime

In five pages the federal and state laws created to prevent the increasing instances of computer crime are discussed. Five source...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

John J. Miller's Article 'Private Parts' and US Privacy Issues

In six pages this article is discussed within the context of lost citizen privacy as the result of government surveillance and inf...