SEARCH RESULTS

YOU WERE LOOKING FOR :Reviews of Articles on Various Computer Subjects

Essays 301 - 330

Testing and Integration of Computer Systems

network, after all, is to transport and control data, and to connect computers and peripheral drives with one another (Huber and B...

A Review of How Computers Work

and experts alike will find this book useful. It is mostly geared, however, to the user not to the computer repair technician but...

Research Proposal Regarding Early Adolescence and Drug Use

criminality (Davies, 1998). Recent studies, including those by Davies (1998) suggest that there are mitigating factors that deter...

Kolcaba and Holistic Care

reporting. Lukas (2004) outlines the problems associated with pain well by pointing out that the potential for postoperative pain ...

Mappings, Feminism and Cultural Geographies of Encounters by Susan S. Friedman

cultures" (Friedman 5). This is what Friedman attempts to offer her readers in this text. Part I focuses on the encounters betwe...

The Visible Hand by Alfred D. Chandler

of managerial hierarchies and conclude with the observation that as businesses grew to dominate certain sectors of the US economy,...

Heath Care Ethics and Values

This research paper pertains to various aspects of ethics, such as the subject of autonomy, drug company advertising policies and ...

Tardiness of Employees

in such rules is tantamount to altering the organizational culture. It is equivalent to allowing teenagers to get multiple piercin...

Perceptions of Change Influences

The writer looks at the way different influences on change have been perceived and subject to theorization in various change mode...

Violence and Mental Illness

In a paper of three pages, the writer looks at mental illness and violence. The links between the two are explored through examini...

Boeing's 7E7 Marketing Audit

Boeing needs to capitalize on its first-mover advantage, gaining commitments - and deposits - on as many 7E7s as possible before t...

Ben & Jerry's Case Analysis

paid incoming salary of $6.50 an hour, keeping his pay at $81,000 for his entire tenure, though the company had grown at an averag...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

The Coco Store and HCI Theory

includes the perceptions and reactions of the reviewer. Biological and cognitive basis for perception According to Greenberg (19...

The Coco Store Website's Interface Design

taking advantage of users intuition and prior experience. Background information What is a human-computer interface? In regards ...

Investigation to Assess the Impact of Downsizing on Employee Motivation

motivation on employees performance and business results has also been seen in the UK; a similar study took place with the Nationw...

Memorandum on Computer Security

XP commands "netstat" and "tasklist". By running these commands, one can swiftly access critical information about the processes r...

A Review of an Internet-Based Educational Activity for Children

greater I.Q.s than those with smaller brains but size is not all that matters ("Big," 2004). The question that should be asked: "I...

Speech Analysis on Globalization

been accompanied by the realisation of the way in which the past has impacted on both the globe and also on the individuals within...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Overview of the 3rd and 4th Generation of Computer Languages

and error prone to program computers, leading to the first "programming crisis", in which the amount of work that might be assigne...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

The Shirt Off Your Back

occurred. Technology changes and moves forwards, whereas once the cloth mills and clothing manufacturers were at the cutting edge...

Rape Victims Issues

whether or not a woman has actually been the victim of a "real" rape. What the student working on this project will want to consi...

Literature Review on Body Image

a period of time during which there was an increasing acceptability to sexual images and messages conveyed through television. Th...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Adventure Concept

If one were to look at a university catalog or perhaps a regional newspaper more than likely there would be an announcement for...

Interpretations of the Life and Crusade of Joan of Arc

precious little thanks she got as an eighteen-year-old in fulfilling it" (george.html). However, Graham (2002) indicates that the ...

Overview of Computer Aided Software Engineering

a total automatic programing environment is still by and large rather illusive, several recent findings bring the fantasy closer ...