SEARCH RESULTS

YOU WERE LOOKING FOR :Injuries Related to Computer Work

Essays 1021 - 1050

Using Computer Networks and Security Issues

In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Computer Game Technology in Japan and the US

In nine pages the computer game industry and its technology in the United States and Japan are the focuses of this comparative ana...

CRT Monitors, Effects, and Diseases

In seven pages this report considers the effects of excessive computer use with such health issues as electromagnetic radiation, b...

Overview of Internet Crime

In fifteen pages this paper examines Internet crime in a consideration of system security concerns and the threats posed by comput...

Overview of the Merger Between IBM and Lenovo

The sharp decline in sales was expected following the turn of the new century as many businesses rushed to replace aging PCs with ...

High School Curriculum and Computer Integration

In five pages this report discusses the significance of computers in the high school educational curriculum. Four sources are cit...

Japan, the U.S. and the Computer Games Industry

In nine pages this paper discusses microenvironmental and macroenviromental issues as they pertain to the computer games industry ...

Marketing Strategies Dell vs. Apple Mac

to the overhead luggage compartment and bringing down his G4 iBook, then, Troyer pulls his G4 iBook from under the seat (Lipperts,...

Types of Computer Viruses

piggybacks on other real programs is known as a virus (Brain, 2005). For example, a virus could attach itself to a spreadsheet pr...

Aviation Safety and CAD Uses

level of liability on the part of the airline company and the aircraft builders, there is a great deal of motivation to find ways ...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Apple Computer Inc. and Its Organizational Culture

In twenty pages this paper examines Apple Computer Inc. in a consideration of its organizational culture. There are thirty source...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

Y2K Preparation

In seven pages this paper examines how an individual can prepare for the new millennium in terms of computer preparation. Ten sou...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Maintenance of Computers

cleaned. When computers are exposed to more dust and dirt than a normal computer would be, they should be cleaned more often. In...

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

Computer Manufacturing and Job Costing

* There are assembly costs to combine the chips and wafers and put them on the motherboard. This costs $10 per hour and requires 5...

Nursing and Computers

of first-year nursing courses for delivery on the Internet has afforded students the opportunity to complete didactic requirements...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Workplace and Introduction of Technology

place on a daily basis such as: short term billing, long term leasing, invoicing, initial processing of customer information and v...

The Computer Giant Apple

John Scully, who was CEO of Apple at the time, made a devastating mistake (Dohrman, 1997). In 1985, Scully confronted Bill Gates, ...

Dell Computer Inc. and Strategic Choice

the early days, hopes that largely have gone unfulfilled until only recently in the consumer market. However, the business-to-bus...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Various Educational Approaches

such activities interactive reading, writing and arithmetic is one particular reason why education from computer programs in grade...

Computer Industry Development and Competition

In five pages the importance of having more than one computer manufacturer is discussed in terms of competition impact and technol...

Computer Design Evolution

In five pages this paper examines how design and art were influenced by the evolution of computers. Four sources are cited in the...

Strategies of Retail and Shopping

This paper consists of three pages in which retail and shopping strategies in times of globalization and computer technology are e...

CPA Company's Computer Software Upgrading

Peachtree itself requires only 486-level capability and Windows 3.1 or Windows 95. However, the data generated by an accounting f...