SEARCH RESULTS

YOU WERE LOOKING FOR :Law and Computer Crime

Essays 1081 - 1110

Financial Report Information on Apple Computers, Inc.

Fourth quarter 1999 through third quarter 2001 reports are utilized in this five page financial analysis of Apple Computers which ...

New Software and Computer Purchaes

In eight pages this paper examines the prices and capabilities of antivirus software and computers in a consideration of the Sys P...

Advent of WebTV

This paper considers how little in the way of computer knowledge is needed to use WebTV in eight pages. Seven sources are cited i...

Types of Computer Programming Languages and Basic Information

In five pages computer programming language types such as object oriented, imperative, logic, and functional are discussed. Four ...

Customer Service from the Perceptions of Customers

In ten pages this paper discuses the differences between the way customers may view customer service and organizational perspectiv...

Workplace VDUs and Safety Issues

Using computers of course does also warrant care and attention to ergonomics. There are many complaints that stem from sitting in ...

Indian International IT Company Satyam Computer Services, Ltd.

Additionally, Satyam has forged numerous alliances over the years, including with IBM, Siebel and Microsoft. Satyams U.S. subsidia...

Basics of Computer Networking

As with any computer networking applications, there exist numerous industry standards as a means by which to offer overall product...

Dell Computers

is the longest-tenured CEO of any major US computer company. Corporate headquarters are located in Round Rock, Texas, near Austin...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Corporate Spy Catching

In eight pages this paper discusses company espionage and the security benefits offered by computer forensics. Eleven pages are c...

2001 COBOL

In a paper consisting of ten pages the COBOL computer programming language is considered as of 2001 along with speculation as to w...

Technology and Work from a Woman's Perspective

In five pages this paper examines how women can make employment use of technological advancements and computer networking. Two so...

Using the Dell Model in Retail

people in the field who work on their systems but are not employed by Dell, but by other companies, also cutting down on the numbe...

Accomplishments of Computer Designer Seymour Cray

components ( Anonymous 2). He was a truly a "master" of computer architecture, creating computer systems with both skill and elega...

A Case Study Concerning Data Protection

easier to use than older products (Ohlhorst, 2002). Therefore, iris authentication is highly recommended. By using computers to i...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

3 Corporate Marketing Questions Answered

differences and similarities do you see between domestic marketing and international marketing at Encyclopedia Britannica Inc.? ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

Computer Network Logical and Physical Designs

computer (Cardiff University, 2003). These configurations rely on the network "neighborhood" for relay of data as well (Cardiff Un...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Disaster Recovery Planning

A survey conducted in 1995 by ICR Survey Research Group regarding vulnerability of computers found that sixty six percent of respo...

Gary Hamel's Leading the Revolution

In seven pages this paper discusses this text in terms of achieving greater insights into GE's CEO Jack Welch and Dell Computer CE...

Overview of the 3rd and 4th Generation of Computer Languages

and error prone to program computers, leading to the first "programming crisis", in which the amount of work that might be assigne...

Overview of the Computer Consulting Industry

as those laid down by the USA Patriot Act and the impact on financial institutions. The weak dollar may also create increased opp...