SEARCH RESULTS

YOU WERE LOOKING FOR :Individual Privacy and Computers

Essays 1021 - 1050

Computer Technology and Art

the diversity and liveliness of the culture of the time. One could...

Media Convergence and the Computer

et al, 2003). In regards to issue that the computers convergence with television as a media tool is often considered the most infl...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

Humanism, Structuralism, and the Individual

to language. For example, there would not be the idea of darkness without an understanding of what it means to have light. Therefo...

Crimes Committed by Computers

The Comprehensive Crime Control Act was created as a means by which to provide Secret Service with legal influence over both compu...

Computer Network Logical and Physical Designs

computer (Cardiff University, 2003). These configurations rely on the network "neighborhood" for relay of data as well (Cardiff Un...

Fortran Computer Programming Historical Overview

Visual program, his brother William went a step further by using the same computer (TX-2) to create a data flow language(Najork). ...

Programming Language Learning and Teaching in a Multimedia Environnment

People can now in fact learn how to program with the use of multimedia. McMaster (2001) explains that if managers want their sal...

Developmental Psychology and a Premier Virtual Computer Generated Symposium

labeled and controlled by drugs, something that alleviates the difficulties for the teachers and parents, but has unknown latent e...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Contemporary World and Adult Self Directed Education

most dynamic approaches to the systematic collection of knowledge in an environment in which that knowledge is collected with the ...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Visually Impaired Individuals and WWW Access

not just regarding developers but also about firms and institutions that purchase products that are web-based (2002). The proble...

The Coco Store Website's Interface Design

taking advantage of users intuition and prior experience. Background information What is a human-computer interface? In regards ...

'The Individual' in The Essential Drucker by Peter Drucker

to detail, to name a few. And, interestingly enough, what may be considered an intolerable trait such as someone needing to be in ...

China of the 20th Century and the Connection Between Property and the Individual

up going over a cliff in his rickshaw. At the bottom of the cliff, however, he finds three camels, apparently having ended up th...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Continuing Oppression of Disabled Individuals

specific individual. According to Joseph Shapiro (author of No Pity: People with Disabilities Forging a New Civil Rights Movement)...

Community, the Individual and Native America's Sociopolitical Order

women had with their community would, in many ways, come to be emulated by American women as they made their footholds in the new ...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Hamlet, Romeo, and Responsibility of the Individual

all thoughts of Rosaline in favor of his new love, Juliet. This rashness is further exemplified in the famous balcony scene, which...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...