SEARCH RESULTS

YOU WERE LOOKING FOR :Global Impact of Computers

Essays 511 - 540

Mac Computer Marketing

B, 2004). The ad was strange, to say the least. It was drab, it was in black and white until the woman burst on to the screen and...

Microsoft Trial and Arguments

monopoly" (Brinkley, 2000). (This isnt unknown business practice; Detroit routinely buys up inventions that might lead to more fu...

Proposition for a School iBook Upgrade

time while currently gaining the greatest utility from the hardware it has and is about to acquire. The Mac OS X Server v10...

'Computer Professionals and the Next Culture of Democracy' by Shuler

may be agents in the transformation of democracy, but democracy is not something that is inextricable with computer science (2001)...

Computer System Development

data needing a broad bandwidth, but also the need for security as patient files are confidential and security measures are not onl...

Stating a Business Case for the Linux Operating System

bits maximum processors 2.4.2 Intel/Cyrix/AMD Pentium, 80486, 80386, 80286 (partial port), 8086 (partial port), IBM/Motorola ...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

Plastics Industry and Computers

industry today makes use of computers, it perhaps could use it even more. Siweck observes: "...American shops need to understand t...

Ireland and China's ICT Industries

the same time, when choosing an environment in which to do business, it pays to look at the industries in both nations as well as ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Chiropractics and Radiology

In five pages this research paper examines how chiropractics will feature radiology in the future in a consideration of digital an...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...

Interdisciplinary Perspective on Philosophy

In five pages this research essay examines how the disciplines of computer science, scientific method, psychology, sociology, art,...

Dinosaur Behavior Determination

thoroughly studied (DiChristina). Careful field research is critical to understanding dinosaurs but it alone doesnt give us much ...

Modern Technology and Gender

In five pages computer technology as it is related to gender is examined. Five sources are cited in the bibliography....

Manufacturing and the Airline Industry

In thirteen pages this paper considers various aerospace and aircraft manufacturing methodologies as well well as the effects of c...

Consideration of Computer Technology

In a paper consisting of four pages the origins of modern computer technology, the abacus, are considered as their evolution progr...

Comparison of the Inventions of Computers and Trains

This essay consists of fifteen pages and considers whether the computer or the train was the more significant invention in terms o...

Computer Domains, Software, and Selection Critera

Computer domains are the subject of this paper consisting of two pages along with the various types of equipment required in order...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Automotive Manufacturing and Computer Technology

of automobile that are more skillfully designed, better built and most importantly safer, all as a result of the vast applications...

Book Review of M. Keller's Rude Awakening

In five pages this book review considers how lack of employee training was the result of computer technology implementation at the...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...