SEARCH RESULTS

YOU WERE LOOKING FOR :History of the UNIX Computer Operating System

Essays 211 - 240

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

Company and Product Review of PowerLeap

In five pages this paper discusses the PowerLeap company and its online computer systems upgrading products as featured on its web...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

The Development and History of Artificial Intelligence

and mathematicians. The conference took place in 1956 at Dartmouth College(Shipley 64). From that point forward the concept of art...

The History of the Modem

This paper examines the history and evolution of the computer modem. This five page paper has six sources listed in the bibliogr...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

General Insurance Company Case Study

This 11 page paper looks at a case study supplied by the student, describing the current manual information systems that are in pl...

GIS Case Study

given regarding the way the system work, if we look at the inputs, the transformation process and the outputs we can consider the ...

Changes in the Personal Computer Industry

radical growth was between 1995 and 2000 (Canter, 2005). The surge in entry occurred much earlier between 1974 and 1984 (Canter, 2...

St Vincent Case Study

managed healthcare companies. The hospitals have to provide the healthcare in a manner that meets their core values and standards ...

Computer System Project

This 10 page paper looks at the way a project to install a computer system in a shop may be planned. The paper focuses ion the pla...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Notebook Computers

for mobile use and efficient power consumption" (Laptop, 2006). They usually have liquid crystal displays, a built-in keyboard, an...

Apple Computers

over to Mac systems, the ability of Intel chips to be used in iMacs has also helped the movement as well as the increasing realisa...

Overview of Prolog Programming Language

Phillippe Roussel went to Montreal and consulted with Colmerauer on natural languages and in a report he issued that September Col...

Home Health and Hospice Company Business Requirement Analysis

critical matters, employee requests for information often go unanswered for too long. Results can and have been employee frustrat...

A Feasibility Study for a Computer Orientation Club

basis. There are many areas of computing that are either not covered by the more formal channels or areas where additional help is...

Using Technology to Help Teach World History

This 5 page paper discusses ways to use the computer, Internet and other technology to teach world history. The writer argues that...

Aviation Safety and CAD Uses

level of liability on the part of the airline company and the aircraft builders, there is a great deal of motivation to find ways ...

History of the Modem

leased lines they used cost a fortune (Whelan et al, 2006). The modem has been around for a long time, since the old Teletype days...

COMPUTER MOTHER BOARD

typically include functional units of a computer including the central processing unit, microprocessor, memory, the basic input/ou...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Therac-25: A Socio-Technical System

this safety net should have been provisions that insured the computer would detect when a high-powered electron beam was chosen by...

Project Proposal; A New Computer System for a Retail Firm

more accurately to changes in demand. The implementation of a system, to allow for the different elements of the business to be br...

NANDA

imply, a standardized nursing language provides a "uniform nomenclature for the diagnosis, intervention, and evaluation components...

Operations Problems at Riordan Manufacturing

immediate vicinity of the goods Riordan is receiving. There are several problems with this arrangement, not the least of wh...