SEARCH RESULTS

YOU WERE LOOKING FOR :Information System Case Studies

Educational System of Mexico

In ten pages this paper discusses Mexico in a consideration of its system of education and the impacts of diverse cultures, langua...

France's System of Education

In nine pages this research paper assesses the elementary school, secondary, and higher education levels that comprise the French ...

ISO 14000 and Environmental Auditing

In eight pages ISO 14001 requirements are examined in an introduction to the new and comprehensive ISO 14000 series as part of the...

How to bring old Power Plants Up to Code

This is a comprehensive paper on the power plant and how they have responded to changes over the years. The need to upgrade system...

International Political History, Liberalism, Neorealism, and the Death of Sovereignty

In seven pages an assertion regarding the death of sovereignty within the current system of global politics is responded to with a...

Kantian Philosophical Perspective on Social Welfare

At the same time, Kant would argue that even if the final result of a mans moral choice is not positive, this does not negate his ...

Overview of Windows 95 by Microsoft

through with everything its makers promised it would do and more. From informational software he can introduce to customers to bus...

Comparative Analysis of Windows 95 and Windows NT Operating Systems

This paper consists of eight pages and in a comparative analysis of these two Microsoft operating systems determines that Windows ...

Psychological Views of the Insanity Legal Defense

In eight pages the legal system is discussed in an overview of how the insanity defense is used from a psychological point of view...

Overview of Recidivism

continue to rise" (Hanke, 1993, pp. 22). Baltimore set an unenviable record for the number of homicides in 1992 of 331, which...

Effectiveness of Parole

This pages consists of nine pages and analyzes the effectiveness of parole in the criminal justice system. Eight sources are cite...

Criminal Justice and Probation

In fifteen pages this paper discusses the criminal justice system in an analysis of probation in terms of history, how it evolved,...

Corrections Officer's Job Description

In ten pages this paper presents an overview of a corrections officer position in a discussion of the prison system, use of firear...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Brief History of Computer Operating Systems

In five pages this research paper discusses OS in terms of history and through a comparative analysis of MS DOS and UNIX. There i...

Novell NetWare 4.11 and Microsoft Windows NT 4 Integration Tools Compared

In eight pages this report compares the two primary network operating systems. Ten sources are cited in the bibliography....

MS DOS, UNIX, and Windows NT Compared

In ten pages these three types of operationg systems are compared in terms of their advantages and differences. Ten sources are c...

Analysis of Oracle 8

In five pages the database management system Oracle 8 is examined in an overview of its performance and cost effectiveness. Four ...

CPU Properties and the Performance of Computers

In five pages this paper considers Pentium processors and their differences in a discussion of how computer performance is influen...

History of the UNIX Computer Operating System

various programs written by many companies to distribute information between multiple computers within the network. This minimize...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Microsoft NT 4.0 and Hackers

In seven pages this paper offers a technical consideration of how Microsoft Proxy 2.0 and Microsoft NT 4.0 can be attributed to th...

Criminal Justice and Computers

In five pages the criminal justice system is examined in terms of the significant impact of computers with FBI investigations of o...

Discussion of Data Warehousing

computer has expanded our ability to access information to a global level from the comfort of our own home. The quantity and velo...

Criminal Justice and the Role of Technology

In six pages this paper examines how criminal justice has benefited from technology in a consideration of various systems, analyti...

Home Computer System Purchase

In five pages this paper considers hardware, software, speed, and size as each pertains to buying a home computer. Four sources a...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Tactics to Minimize Computer Crimes

'Cracking' and 'hacking' are among the topics discussed in this examination of computer systems and unauthorized access consisting...

Comic Books' Ratings Systems

In five pages this persuasive paper argues that the ambiguous Comics Code Authority needs to be replaced with a more clear and dis...