SEARCH RESULTS

YOU WERE LOOKING FOR :Internet Applications used by Amazon com

Essays 301 - 330

Vulnerabilities of Windows and Possible Solutions to These Problems

a GUI or Graphical User Interface. While Windows had become increasingly popular for mainstream purposes, it was something that wo...

Overview of Graphic Interchange Format

In seven pages GIF is presented in an overview of its animation uses, functions, and Internet image development with competition s...

Employees and Computerized Monitoring by Employers

The unfair employer practice of using computerized monitoring of employee emails and Internet access is discussed in five pages. ...

Internet and IT

In eighteen pages this paper discusses business information systems and the increase in Internet technology uses. Twelve sources ...

Office Innovations Offered by the Internet

In three pages this paper discusses how office automation has been assisted by Internet technology and its global uses. Three sou...

The Uses of TCP/IP Protocol Today

their old SNA (systems network architecture) for crucial applications (Passmore, 1997) as real or potential hybridization of netwo...

Internet and Political Campaigns

In five pages this paper examines the growing political importance of the Internet and considers how it was used during the presid...

Ecommerce and the Internet

In six pages this paper discusses the Internet and its uses for banking and other types of electronic commerce and also considers ...

Internet Dangers and the Vulnerability of Children

In ten pages this paper examines how children using the Internet makes them vulnerable to various dangers including tobacco and al...

Researching the Poem ‘Ars Poetica’ by Archibald MacLeish on the Internet

scanned text files, featured a scanned version Frank St. Vincents important exposition of the poem that was first published in Exp...

Monster Networking Case Study

been heavily involved in the marketing aspects of Monster.com (Eisenmann and Vivero, 2006; Wasserman, 1999). TMP spent over a bil...

Case Study; Freedom of Speech and Satire Criticizing a Company

attentions to flaws, such as unfairness, stupidity and existing vices. The first amendment has been found to protect the use of sa...

Comparative Analysis of the Internet and the Penny Press

This paper consists of ten pages and contrasts and compares the Internet and the penny press in terms of uses from technological a...

Diagnosing Medical Problems

body" (What causes anemia?, 2009). The symptoms of this condition include pale skin and fatigue, and the causes include "[A]n iron...

A Marketing Campaign to Promote Tasmania as a Tourist Destination

is going to be that of soft eco tourism. This is a viable growth market. Eco tourism, in general terms is perceived as a form of t...

Analyzing the World's Largest Auction Site

logistics, also. The deal is made between the seller and buyer and it is the buyers responsibility to ship the item to the buyer. ...

How to Use AdWords

with a list of keywords, to the engine" (What is pay per click advertising?, 2009). They also tell the search engine how much mone...

Online Promotional Tactics of 4 Websites

paper, we will explore four web sites to determine exactly what promotional strategies are used - and how/if these strategies can ...

Meeting Online and the Internet

can be beneficial in helping some individuals meet and form relationships, especially those who have had difficulty doing so becau...

Teens and the Internet

the social skills that one to one contact would offer them. As such, then, these teens are not able to effectively reach out emoti...

Theory and Internet Relationships

media influence all around" (401)? How this applies to interpersonal relationship-building in the electronic environment is not i...

Classrooms, Technology, and Education

which methodologies are the most useful in terms of fully utilizing technology in the classroom and which areas may be better left...

Bruce D. Nordwall's Article 'The Use of IP and PKI in Avionics'

for avionics networks (Nordwall, 2003). IP security appears to allow a high degree of control, but this alone is not sufficient. T...

Overview of VoIP Technology

traditional telephone companies (VoIP). The development of this market has a umber of supplier, such as VocalTec, 3Com, Cisco, a...

Internet Addiction Disorder

addiction, including salience, mood modification, tolerance, withdrawal, conflict and relapse" (Griffiths, 2001, p. 333). Intern...

Small Business Operations and the Internet

to still address their personal needs when it is convenient for them. "Hundreds of major retailers dot the Web with a fast-evolvi...

World Peace and the Internet

In a paper consisting of five pages whether or not the Internet can be used as a diplomatic instrument of world peace is considere...

Authors and Resource Validity

results of a survey revealed that 66 % of teachers used their computers "a lot" for classroom instruction, and 39 % frequently use...

Comparative Case Study on Strategic Internet Marketing

In six pages this paper compares and contrasts 2 commercial Internet websites in an examination of differences and similarities re...

Information Transference Analysis

the value of grassroots knowledge is a managerial investment. Management may feel more comfortable in hiring outside of the ranks...