SEARCH RESULTS

YOU WERE LOOKING FOR :Societal Impact of Computer Technology

Essays 961 - 990

Deviance: Mental Illness And Homelessness

crime was chemical or emotional disparity. From colonial times where people were chained to block walls in dark, dank dungeons an...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

The Impact of Authority on Human Behavior

of volunteers complied with the instructions they were given, many were prepared to continuing giving electric shocks which could ...

Computer Tools and Inappropriate Prescribing for the Elderly

The incidence of inappropriate medication prescriptions issued to elderly individuals is estimated to be between 12 and 40 percent...

Persuasion Analysis of Mac Advertisement

the right side looks like flashes: "It comes with the worlds most advanced OS." The second row shows service techs, images of ap...

Memorandum on Computer Security

XP commands "netstat" and "tasklist". By running these commands, one can swiftly access critical information about the processes r...

Urban Combat Readiness and Computer Simulations

information technology has been growing at an exponential rate. In just a few short years, computers have evolved from large, clun...

Acer Computers: A Case Analysis

research available. By conducting a case analysis, one is able to delve deeply into a topic, identifying not just the superficial ...

Computer Based Crime Reporting

enforcement agencies are faced with the complex problem of having not just to apprehend criminals but also to report what they hav...

Introduction to Psychobiology

the brain waves. Electrodes are places on the scalp and a machine picks up the shape and types of waves, e.g., alpha waves or beta...

BUSINESS CONTINUITY PLAN: DATA PROTECTION

In a previous paper, the writer pointed out that illegal intrusion into a database - whether physical or via Internet - is a huge ...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Computers in the Reading Classroom

In a paper consisting of five pages the ways in which computers can assist children in developing reading skills are discussed in ...

English as a Second Language Students and the Internet

In 5 pages this paper examines how ESL students use computers and the Internet in an overview of spell checkers, chat rooms, and e...

Problem Definition and Solutions

In five pages this paper defines a Y2K computer bug and then considers some possible strategic development solutions. Three sourc...

Corporate View of Dell Computer Corporation

In ten pages Dell Computer is viewed from a corporate perspective with a discussion of their corporate philosophy, company premise...

Film Computer Generated Imagery and Its Role

technology advanced and first sound, then color was added to feature films. As evidenced by Melies early filmed magicians tricks,...

Toddlers and Computers

In 5 pages this paper discusses toddlers in preschool and computer uses. There are 4 sources cited in the bibliography....

Motion Picture Industry and Future of Computer Graphics

In ten pages an evaluation of whether the creation of special effects through computer generated graphics is merely a passing tren...

Disabled School Children and Computer Access

In five pages the devices that assessed schoolchildren to access computers are discussed in terms of their suitability in an evalu...

Overview of the Air Data Computer

In five pages the air data computer is examined in terms of its operations and role in flight crew information relaying. Five sou...

Personal Computers and Desktop Workstations

In five pages this paper examines contemporary personal computers and desktop workstation components. Four sources are cited in t...

Crime of Computer 'Hacking'

The topic of this argumentative essay consisting of seven pages is computer hacking, which is presented as a serious crime that re...

Computers and Their Five Generation Evolution

In five pages this paper examines the 5 generations of computers in an overview of how they evolved with circuitry pictures defini...

Overview of PKI

In six pages this paper considers computer networking protection through public key infrastructure in this overview that includes ...

Film, Photography, and Computer Generated Animation

In five pages the uses of animation that is generated by computers in terms of human motion visualization and greater understandin...

Computing Job Consideration

In a paper that contains three pages the importance of work experience, the necessity to make proper module choices and what emplo...

Computer Selection

In five pages a friend with a limited budget is seeking advice regarding a computer purchase and this paper considers appropriate ...