SEARCH RESULTS

YOU WERE LOOKING FOR :Security Topics for Computers

Essays 1501 - 1530

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Analyzing Steve Jobs' Ethics

ways, this is unscrupulous behavior. Xerox would sue him down the road and then when Bill Gates stole the Apple platform for his W...

High Tech Companies and Human Resources

learning motto because their employees need to be on the cutting-edge. The only way to do this is through continuous training and ...

Background and Analysis of the UNIX OS

and users the opportunity to use their computer systems to their maximum advantage. Its probably safe to say that if not for UNIX,...

International Expansion Types Advantages and Disadvantages

be staffed? Are executives willing to relocate to a foreign country? Many questions must be asked when embarking on such a major p...

Flat Panel Computer Monitors Advantages and Disadvantages

with traditional monitors; secondly, considerable effort has been put into the exterior casings of the flat-panel monitors and man...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Is New Software Negatively Impacting Students' Effectiveness as Readers and Writers?

Indeed, the world suffers from a monumental overpopulation problem that is at the root of many of todays educational problems. Th...

Colombia and the Marketing of Acme Computers

useful life of existing systems. Where networks are being developed, PC manufacturers can expect results to be state of the art. ...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Cybercrime

whilst others are not adequately covered. However, when looking at the act and the way in which the internet has developed since t...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Contemporary World and Adult Self Directed Education

most dynamic approaches to the systematic collection of knowledge in an environment in which that knowledge is collected with the ...

Fortran Computer Programming Historical Overview

Visual program, his brother William went a step further by using the same computer (TX-2) to create a data flow language(Najork). ...

Learning Center Ideal

socially. The greater the overall interaction the better the prospects for economic improvement (Lewin-Epstein et al, 2003). Onc...

Prototype Model Building and Layer manufacturing

v4.3.2 from IBM and Solaris v2.6.0 from Sun Microsystems, all of these will require OpenGL. Various windows formats are also used...

Computer Technology and Art

the diversity and liveliness of the culture of the time. One could...

Media Convergence and the Computer

et al, 2003). In regards to issue that the computers convergence with television as a media tool is often considered the most infl...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

Dell's New Strategy Plan

tag, it is hard to know whether or not the future will be just as kind to this firm that has done well so far. After all, the econ...