SEARCH RESULTS

YOU WERE LOOKING FOR :Injuries Related to Computer Work

Essays 1201 - 1230

Computer Law Understanding and the Significance of System Administrators

act maybe hard for the system administrators as it is lengthy, with 75 sections and a total of 16 schedules. However, this...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Computer Game Technology in Japan and the US

In nine pages the computer game industry and its technology in the United States and Japan are the focuses of this comparative ana...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

High School Curriculum and Computer Integration

In five pages this report discusses the significance of computers in the high school educational curriculum. Four sources are cit...

Japan, the U.S. and the Computer Games Industry

In nine pages this paper discusses microenvironmental and macroenviromental issues as they pertain to the computer games industry ...

CRT Monitors, Effects, and Diseases

In seven pages this report considers the effects of excessive computer use with such health issues as electromagnetic radiation, b...

Overview of Internet Crime

In fifteen pages this paper examines Internet crime in a consideration of system security concerns and the threats posed by comput...

Using Computer Networks and Security Issues

In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Cybercrime

whilst others are not adequately covered. However, when looking at the act and the way in which the internet has developed since t...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Hypertext

, 2000). Hypertext, when it is combined with the telecommunications revolution, surely becomes the largest change in the way in...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...