SEARCH RESULTS

YOU WERE LOOKING FOR :Security Topics for Computers

Essays 1081 - 1110

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Home PC Consumer Considerations

This paper considers home personal computer consumer purchasing decisions on three pages. Two sources are cited in the bibliograp...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Workplace Computer Training and Digital Diplomas

low cost, high speed Internet access, has made virtual reality virtually a reality. The dual office-classroom described above exe...

Overview of Hydrodynamic Hull Testing Development

In ten pages this paper presents the development of hydrodynamic hull testing in an overview that includes history, technology, co...

Women in Computers

This paper consists of six pages and discusses female pioneers in the field of computers in a consideration of Grace Murray Hopper...

Classroom Uses of Computers

In nine pages the ways in which computer technology has been integrated into the classroom are examined in terms of the benefits i...

Compaq Computer and Supply Chain Management

In six pages this paper examines Compaq Computers in a consideration of the company's supply chain management. Seven sources are ...

Comparative Advantage of Dell Computer

In six pages the personal computer industry and its changes are examined in the responses of corporate giants, Gateway, Compaq, an...

2001 COBOL

In a paper consisting of ten pages the COBOL computer programming language is considered as of 2001 along with speculation as to w...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

At the Classroom Forefront Apple Computers Remain

In a paper consisting of five pages the ways in which innovative marketing has kept Apple in control of the education market are e...

The Handheld Electronic Device

A proposal for a palm computer that contains cellular phone service is discussed in the context of this ten page paper that includ...

Technology and Work from a Woman's Perspective

In five pages this paper examines how women can make employment use of technological advancements and computer networking. Two so...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Accomplishments of Computer Designer Seymour Cray

components ( Anonymous 2). He was a truly a "master" of computer architecture, creating computer systems with both skill and elega...

Post Industrialization Graphic Design

had it been possible to combine content and layout abilities in the same medium, and at the same time. The personal computer not ...

Mac v. IBM

one was more portable and business people bought them up so they could carry their computer with them when they traveled. Compaq a...

Cameroon's Computer Industry

In five pages this paper examines various factors associated with Cameroon's computer industry. Two sources are listed in the bib...

Dell Computers

is the longest-tenured CEO of any major US computer company. Corporate headquarters are located in Round Rock, Texas, near Austin...

Basics of Computer Networking

As with any computer networking applications, there exist numerous industry standards as a means by which to offer overall product...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Computer Technology and Effective Educator Communications

use in todays business environment, all of which are appropriate to specific sets of circumstances. The business environment is t...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...