SEARCH RESULTS

YOU WERE LOOKING FOR :Social Revolution and Computer Technology

Essays 1411 - 1440

CRT Monitors, Effects, and Diseases

In seven pages this report considers the effects of excessive computer use with such health issues as electromagnetic radiation, b...

Strategic Procurement and Supply Chain Management

In ten pages this paper examines Dell Computer Corp. in a consideration of supply chain management and strategic procurement with ...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Using Computer Networks and Security Issues

In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of...

Computerized Charting, Ethical and Legal Considerations

In six pages this paper examines the increased hospital use of computers to record charts of patients from ethical and legal persp...

Social, Nationalistic, and Religious Grievances in the Iran Revolution of 1978 and 1979 and Lebanon's Hezbollah Movement

In seven pages this paper discusses the roles religion, nationalism, and social issues played in these two uprisings. Five source...

SWOT Analysis of Gateway

In five pages Gateway Computers is subjected to a SWOT analysis of the company's strategy, positioning, finances, and conditions o...

Computer Operating Language Python

used; this decreases the costs of the learning process as well as the programme maintenance processes. The language supports modul...

Authors and Resource Validity

results of a survey revealed that 66 % of teachers used their computers "a lot" for classroom instruction, and 39 % frequently use...

Apple Computer - Case Study

The writer gives a short history of Apple Computer, a statement of the problem and a possible recommended course of action. The wr...

Network Selection

In five pages a company in need of a computer network is discussed in a hypothetical scenario that considers choices, configuratio...

Computer Hardware Change Management and its Implications

In six pages this paper examines how computer hardware changes have significant risk and reward implications for corporate managem...

Small Business and the Marketing of Computer Services

In seven pages this paper examines small business in an assessment of end to end computer systems services marketing with marketin...

How Computer Forensics are Used in Police Investigations

2005). Net Threat Analyzer is a software program that is booted from the computer itself and then makes use of filtering tools in ...

MCBRIDE MEMO - A RESPONSE

be accessed from almost any computer. These are run through a web browser or equivalent type of program. Probably the two best-kno...

Computer Crime Of The Future

great extent, the need for technical patches will still remain pertinent to meeting, if not deflecting, the growth of hacking crim...

Children and Computer Introduction

This is where interactive technology will help to ease such a burden (Block, Gambrell and Pressley, 2004). Numerous studies...

DELL INC. AND DISTRIBUTION IN CHINA

statements. Furthermore, Chinese competitors of Dell have somewhat of a singular advantage, that being backing from the Ch...

UK and US Copyright for Computer Porgrams

patent as the process was in the ROM. If the patent application was a development that included a computer programme but was not a...

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Digital Era and the Certified Public Accountant's Role

will have to go about it. Largely, these changes are positive and open new doors for those in the field. In focusing in on the ch...

Women in Computers

This paper consists of six pages and discusses female pioneers in the field of computers in a consideration of Grace Murray Hopper...

Home PC Consumer Considerations

This paper considers home personal computer consumer purchasing decisions on three pages. Two sources are cited in the bibliograp...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Workplace Computer Training and Digital Diplomas

low cost, high speed Internet access, has made virtual reality virtually a reality. The dual office-classroom described above exe...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

Compaq Computer and Supply Chain Management

In six pages this paper examines Compaq Computers in a consideration of the company's supply chain management. Seven sources are ...

Comparative Advantage of Dell Computer

In six pages the personal computer industry and its changes are examined in the responses of corporate giants, Gateway, Compaq, an...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...