SEARCH RESULTS

YOU WERE LOOKING FOR :Human Intelligence versus Computer Intelligence

Essays 1411 - 1440

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

eCommerce Strategy of Dell

In five pages Dell's corporate rise within the personal computer industry is assessed in terms of its ecommerce strategy. Four so...

Global Marketing of Computers

In five pages a United States' computer retailer is considering expanding operations to Morocco and this paper presents a marketin...

An Overdoes of Intravenous Medication and a Change Theory Application

while in the hospital plus the incidence of symptoms and/or disease that would have initially required use of the medication. In ...

Using Computer Networks and Security Issues

In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Information Access and Computer Science

In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into ...

Overview of Information Management

In five pages this paper examines the challenges of organizational information management in the technological age of the Internet...

Federal Government Sharing of Strategic Information

In seven pages this paper discusses the problems associated with capital planning and budget computer information storage in a con...

Continuing Learning Plan and Nursing

In five pages this paper discusses the importance of continuing learning in the nursing profession in a consideration of the impor...

Globalization, Technology, and Graphic Design

and the popular culture of mass communications. There has been a tendency to dismiss computer art as being in some way inferior to...

Computer Allocation Justification

In five pages this report justifies a computer allocation to a company manager in an explanation to management how efficiency and ...

P2P Connections, Grid Computing, and Their Impacts

In five pages this paper discusses how the future of computers has been impacted by P2P connections and grid computing. Ten sourc...

Copyright Violations and Business Ethics with Issues of Computer Software and NAPSTER

In five pages reproducing unauthorized computer software and digital music are featured in this examination of business ethics wit...

Typography and Computer Effects

such significant changes, it is important to first understand this transformation as it relates to graphic design. Two- and three...