SEARCH RESULTS

YOU WERE LOOKING FOR :Overview of Computer Security

Essays 271 - 300

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

Smart Clothing and Wearable Computer Technology

between this system and: "passive reminder system (such as a paper organizer) or a context-blind...

Overview of Computer Crimes

computer terminals, stolen floppy disks with company information, or direct access to the network by individuals, either criminal ...

Overview of a Computer Internship Essay

certain jobs, and that the workplace environment and the job focus reflect elements of personality. The personality types of job ...

Stadium Security and Honeywell

systems are interconnected on a single network. The Honeywell network consists of a "structured cabling system for voice and data...

E-Marketing Strategies for a Computer Company

benefit of Prehistoric Computers. Having said that however, the one big disadvantage is that the information supplied by t...

Overview of Computer Database Structures

(George Mason University, 2003). Furthermore, the flat file database is familiar to most users -- meaning it is more familiar and ...

Security Issues and the Effects of Organizational Culture

of organization. All of these things are significant in the decision-making process. First, what is organizational culture and why...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Overview of Hypertext

, 2000). Hypertext, when it is combined with the telecommunications revolution, surely becomes the largest change in the way in...

The Changes in Airport Security Through the Years

In a paper that contains six pages the history of airport security is discussed with the impact of the 911 terrorist attacks also ...

United Nations Security Council Threats

of challenges that constitute threats to international peace and security, and whether this new trend is a positive development fo...

Communications Between Computer and Printer in Document Printing

In five pages the communications between a computer and printer regarding document printing are examined within the contexts of ne...

Dell Computers

is the longest-tenured CEO of any major US computer company. Corporate headquarters are located in Round Rock, Texas, near Austin...

Computer Anxiety and Gender Differences

In six pages this paper discusses how computer anxiety may be gender based with a consideration of 3 studies in which a correlatio...

Indian International IT Company Satyam Computer Services, Ltd.

Additionally, Satyam has forged numerous alliances over the years, including with IBM, Siebel and Microsoft. Satyams U.S. subsidia...

Animation in 3D

for a 2D presentation is called cel animation (Doyle, 2001). The third dimension is added through the processes of modeling, text...

Overview of Prolog Programming Language

Phillippe Roussel went to Montreal and consulted with Colmerauer on natural languages and in a report he issued that September Col...

American Leadership as Personified by Steve Jobs and Virginia Henderson

CP/M, which was shortly to be succeeded by MS/DOS (Alsop 188). The Macintosh operating system offered an icon-driven system that a...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

Multinational Corporation Proposal of International Security Protection

whose goal is to report a news story or open a new market for a multinational business. Globalization absolutely is an incr...

Issues Through Liberal and Conservative Lenses

liberal origins, the conservative had developed their own distinctive view of Social Security, which can be summed up in a single ...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Russia Sales and IBM

In six pages this paper answers questions having to do with IBM's sale of a super computer and 16 computer work stations to a nucl...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

E-Commerce and Security Issues

A paper examining common security problems faced in e-commerce. Specifically, the author addresses high-security measures such as...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...

College Campuses and Date Rape

In ten pages college campuses and the incidences of acquaintance or date rape are examined in terms of information, statistics, se...

Overview of Hydrodynamic Hull Testing Development

In ten pages this paper presents the development of hydrodynamic hull testing in an overview that includes history, technology, co...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...