SEARCH RESULTS

YOU WERE LOOKING FOR :Security Issues and Computer Viruses

Essays 751 - 780

Comparing Computers by Gateway and Dell

In five pages choices for a personal home computer purchase are discussed in a comparative analysis of two major manufacturers. T...

Computers and Typography

In five pages this paper examines how computers have influenced the art of typology. Two sources are listed in the bibliography....

Dedication of the Secret Service

would be protected until age 16. Major Presidential and Vice Presidential candidates, and their spouses are also afforded protecti...

Animation Generated by Computers

was a Hollywood breakthrough because all visuals were completed through computer animation. "Toy Story" has had the effect of act...

Educational Project on Computers as Learning Tools

rotating basis. Percentage of participation All students will be able to participate in the project, in relationship to the numbe...

Ballistic and Nuclear Missiles Compared

In five pages ballistic and nuclear missiles are compared in terms of controlling capabilities, and positive as well as negative c...

Comparative Analysis of Computers and Humans

feel. They can not alter their communication style, or any other style, to better communicate and establish a connection with the ...

Public School Technology Upgrade Tutorial

A radical 3 stage technology upgrade plan for a public school staff that knows little about computers is presented in a tutorial c...

Preschoolers and Educational Software

In five pages preschool and children of early elementary school age are the focus of this consideration of early educational compu...

Small Business and the Marketing of Computer Services

In seven pages this paper examines small business in an assessment of end to end computer systems services marketing with marketin...

Technology and Leadership

their life or the life of those around them? A leader has the "capacity to create or catch vision." In other words a leader has ...

Computer Hardware Change Management and its Implications

In six pages this paper examines how computer hardware changes have significant risk and reward implications for corporate managem...

James Jeffords' Political Party Change and the Conflict Between Liberal and Conservative Views

In six pages this paper discusses the ideological conflict between conservative and liberal political part, the role of social sec...

Authors and Resource Validity

results of a survey revealed that 66 % of teachers used their computers "a lot" for classroom instruction, and 39 % frequently use...

Apple Computer - Case Study

The writer gives a short history of Apple Computer, a statement of the problem and a possible recommended course of action. The wr...

Network Selection

In five pages a company in need of a computer network is discussed in a hypothetical scenario that considers choices, configuratio...

Europe and its Common Security Policy Failure

In sixteen pages this paper examines the European Union in an analysis of why the implementation of a policy regarding common secu...

IT's Impact on HRM's Changing Role

In seventeen pages this paper examines how human resource management has been affected by computers and the use of information tec...

Security Risks of Data Warehousing

In eight pages a possible security risk posed by a company's external data warehouse is examined in terms of the business's altern...

Future Demands on National Security

It also presents a valuable model for the most effective aspects of integration at all levels of a combined operation. Background...

Banking Industry and Computer Technology

banking, and so on. Workplaces are good places to examine how the dreams and dilemmas of computerization really work out for larg...

Analysis of Shoplifting in America

product movement analysis reports, the number of actual shoplifter apprehensions, and the revelation of demonstrable signs of thef...

Computer Operating Language Python

used; this decreases the costs of the learning process as well as the programme maintenance processes. The language supports modul...

SWOT Analysis of Gateway

In five pages Gateway Computers is subjected to a SWOT analysis of the company's strategy, positioning, finances, and conditions o...

President George W. Bush, the Stock Market, and the Social Security System in the United States

In a paper that contains five pages the Bush proposal to rescue the financially troubled Social Security system through partial pa...

Computerized Charting, Ethical and Legal Considerations

In six pages this paper examines the increased hospital use of computers to record charts of patients from ethical and legal persp...

Law Enforcement and Computer Technology

easily lured on the Internet. Detectives posing as children can set a time and place to meet a suspect without them ever knowing t...

Customer Service from the Perceptions of Customers

In ten pages this paper discuses the differences between the way customers may view customer service and organizational perspectiv...

School Children, Internet, and Computer Classes

everywhere - in the workplace, in libraries, and in the home. According to a 1998 commercial survey, some 60 percent of American ...

4 Methodologies for Information Systems Development

In nine pages information systems development is examined in a consideration of four methodologies including Information Systems w...