SEARCH RESULTS

YOU WERE LOOKING FOR :Individual Privacy and Computers

Essays 1111 - 1140

Communications of the Future and IT

In five pages this paper discusses information technology in a consideration of computer developments past, present, and changes r...

Video to Go Hypothetical Business Case Study

This paper consists of six pages and discusses the importance of computer technology to the hypothetical Video to Go company and e...

Real Estate Property Management and Computer Networking

Real Estate property management and the importance of computer office networking are discussed in five pages. Three sources are c...

Plan Proposal for Computer Game Business

In thirteen pages and five sections the CuttingEdge computer game business is examined in a proposed plan that includes company in...

Computer Design Evolution

In five pages this paper examines how design and art were influenced by the evolution of computers. Four sources are cited in the...

Maintenance of Computers

cleaned. When computers are exposed to more dust and dirt than a normal computer would be, they should be cleaned more often. In...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Community and the Individual in The Grapes of Wrath and In Dubious Battle by John Steinbeck

In six pages these novels are contrasted and compared in a consideration of how community and the individual are portrayed and als...

Apple Computer Inc. and Its Organizational Culture

In twenty pages this paper examines Apple Computer Inc. in a consideration of its organizational culture. There are thirty source...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

Oil Industry's Changing Technology

In twelve pages this paper examines how the oil industry changed in the 20th century due to such technology as satellites, compute...

U.S. Computer Age

In twelve pages this paper examines the U.S. in a consideration of the social impact of computers. Eight sources are listed in th...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

Individual Psychological Analysis

In five pages a person's strengths and weaknesses are considered in this psychological profile analysis that includes setting goal...

Cultural Prosperity and the Curtailment of Individual Rights

In five pages this paper discusses cultural prosperity in an assessment of whether or not there should be a curtailment of individ...

Nursing and Computers

of first-year nursing courses for delivery on the Internet has afforded students the opportunity to complete didactic requirements...

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

Gateway and Dell Websites

In seven pages these two computer manufacturers' websites are evaluated with a brief corporate description provided and then an an...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

At the Classroom Forefront Apple Computers Remain

In a paper consisting of five pages the ways in which innovative marketing has kept Apple in control of the education market are e...

Writings of Zora Neale Hurston and Chinua Achebe on Society and the Individual

In 5 pages this paper considers how the authors portray society and the individual in the character of Janie Crawford in Zora Neal...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Military Affairs and the New Technology Revolution in Warfare

In ten pages this paper examines the impact of new military technology in terms of training, computer simulations, and on Kosovo's...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...