SEARCH RESULTS

YOU WERE LOOKING FOR :Methods of Computer Storage

Essays 811 - 840

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Positive and Negative Aspects of Computers

and dilemmas of computerization really work out for large numbers of people under an immense variety of social and technical condi...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

E-mail's Influence on Corporate Management Practices

A paper discussing the impact and influence e-mail has had on the corporate landscape. The author discusses the impact of other c...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Place, Space, an the 'Infobahn' in City of Bits by William J. Mitchell

A book report on City of Bits by William J. Mitchell consists of five pages and considers the pervasive social and individual infl...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Saudi Arabia Software CDs and Music Marketing

In ten pages this paper examines the prospect of conducting limited business in Saudi Arabia in this case study of Soft Sound, a c...

Cross Curriculum Pros and Cons of Computer Usage

In fifteen pages this paper discusses elementary education and the uses of computers in a consideration of pros and cons. Twenty ...

History and Future of Computer Networking

In eight pages the history of computer networking is discussed along with the importance of operating system choice, policy establ...

Compaq vs. Dell

delivered through old and tired methods. The very nature of the Internet has contributed to the success or lack of it for m...

Firefighting Assistance from Computers

to accurately predict the conditions in which the fire would burn out (Walton, 1985). This revolutionary computer "expert syste...

CPA Company's Computer Software Upgrading

Peachtree itself requires only 486-level capability and Windows 3.1 or Windows 95. However, the data generated by an accounting f...

Field of Computer Graphics

Computer graphics are defined along with a discussion of its business and entertainment uses in a research paper consisting of fiv...

Twenty First Century Computer Counseling

In nine pages this research paper discusses therapy, counseling, and how computers are being used with a consideration of such pra...

Contemporary Educational Profession Issues

In twenty five pages this research paper discusses various teaching issues such as liability for educators, technology, computers,...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...

Computers and the Law

This paper consists of five pages and examines the various ways in which judges and lawyers utilize computers. Five sources are c...

Disadvantaged or Low Income Learners and Computer Literacy

A proposal outline consisting of eleven pages describes computer literacy program funding designed to assist students who are eith...

Home Computer System Purchase

In five pages this paper considers hardware, software, speed, and size as each pertains to buying a home computer. Four sources a...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...