SEARCH RESULTS

YOU WERE LOOKING FOR :Issues of Human and Computer Interface

Essays 781 - 810

Stating a Business Case for the Linux Operating System

bits maximum processors 2.4.2 Intel/Cyrix/AMD Pentium, 80486, 80386, 80286 (partial port), 8086 (partial port), IBM/Motorola ...

'Computer Professionals and the Next Culture of Democracy' by Shuler

may be agents in the transformation of democracy, but democracy is not something that is inextricable with computer science (2001)...

Computer System Development

data needing a broad bandwidth, but also the need for security as patient files are confidential and security measures are not onl...

Workplace Computer Training

somehow to computers and the internet" (Survival Skills for the High School Graduate, 2005). They stress that any and every indivi...

Mac Computer Marketing

B, 2004). The ad was strange, to say the least. It was drab, it was in black and white until the woman burst on to the screen and...

MCBRIDE MEMO - A RESPONSE

be accessed from almost any computer. These are run through a web browser or equivalent type of program. Probably the two best-kno...

DELL INC. AND DISTRIBUTION IN CHINA

statements. Furthermore, Chinese competitors of Dell have somewhat of a singular advantage, that being backing from the Ch...

Computers Enhance Social Skills

isolate the children from each other but since few classrooms have one computer per child, the opposite has happened. Children clu...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

BUSINESS CONTINUITY PLAN: DATA PROTECTION

In a previous paper, the writer pointed out that illegal intrusion into a database - whether physical or via Internet - is a huge ...

Acer Computers: A Case Analysis

research available. By conducting a case analysis, one is able to delve deeply into a topic, identifying not just the superficial ...

Computer Based Crime Reporting

enforcement agencies are faced with the complex problem of having not just to apprehend criminals but also to report what they hav...

Modern Life Run by Technology and Computers

about half of all Americans, according to one source, have Internet access (Roberts, 2005). But still, the number of people buying...

How Computer Forensics are Used in Police Investigations

2005). Net Threat Analyzer is a software program that is booted from the computer itself and then makes use of filtering tools in ...

Computer Crime Of The Future

great extent, the need for technical patches will still remain pertinent to meeting, if not deflecting, the growth of hacking crim...

Children and Computer Introduction

This is where interactive technology will help to ease such a burden (Block, Gambrell and Pressley, 2004). Numerous studies...

UK and US Copyright for Computer Porgrams

patent as the process was in the ROM. If the patent application was a development that included a computer programme but was not a...

Laws and Regulations Governing the Use of Animals

be made for that ideology with some animals but "Virtually every major medical advance of the last century has depended upon resea...

Laptops and Babies Are Not a Good Combination

way: "Have you called XYZ for technical support before? Ah, you have. And what is your case number?" This was usually followed by ...

Computer Networking and How It Evolved

was to become the Internet, or World Wide Web, progressed during the late 1970s, the need arose to establish a standardized protoc...

PROCESSES IN COMPUTER PROGRAMMING

shrank in size), different programs were needed to keep up with the demand. These days, computers are still asked to calculate. Th...

Apple Computers Founder and Chief Executive Officer Steve Jobs

from a paltry $2 billion to over $18 billion and the stock shot up to $111 from an embarrassing $12(Jackson 2000) . "We shipped mo...

Description and Occupational Outlook of Computer Programming

In six pages the field of computer programming is examined in terms of its duties, salary, risks, and future occupational outlook....

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Website Implementation

people will come. The standard adage when it comes to success on the Internet is make sure the web site is good, or dont even bot...

CD Store Suggested Scenario

that at some point we could work or details of individual tasks. This can be built into a database by adding an extra stem or lea...

Examination of Compilers

Questions, 2001). However, compilers, even ones written for the same programming language, can differ greatly. Wong (2003) asser...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Hypertext

, 2000). Hypertext, when it is combined with the telecommunications revolution, surely becomes the largest change in the way in...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...