SEARCH RESULTS

YOU WERE LOOKING FOR :Societal Impact of Computer Technology

Essays 1291 - 1320

Corporate Spy Catching

In eight pages this paper discusses company espionage and the security benefits offered by computer forensics. Eleven pages are c...

Science and 'Realistic' Computer Modeling

of humanity in ways that are sometimes incalculable. From the time of the scientific revolution, the extent to which technologica...

Mac v. IBM

one was more portable and business people bought them up so they could carry their computer with them when they traveled. Compaq a...

Cameroon's Computer Industry

In five pages this paper examines various factors associated with Cameroon's computer industry. Two sources are listed in the bib...

A Computer System and Purchasing Tickets Online

In five pages the ways of buying movie tickets online and the types of web pages, navigation, design and links needed to create su...

Replication of Data

is stored on computers within an organization would be a total nightmare; the business would be virtually unsalvageable in some ca...

The Computer Giant Apple

John Scully, who was CEO of Apple at the time, made a devastating mistake (Dohrman, 1997). In 1985, Scully confronted Bill Gates, ...

Computer Manufacturing and Job Costing

* There are assembly costs to combine the chips and wafers and put them on the motherboard. This costs $10 per hour and requires 5...

Leasing Information Technology Equipment Benefits and Costs

of limited resources and a need to maximise the resources that are available leasing can also be seen as providing some benefits. ...

A Revised Computer System and the Problems of Audio Visual Corporation

cut down on extra time and money the company did not need to be spending. In order to eliminate these wasted resources, Audio Vis...

Computer System Life Cycle Development and Testing

are overwhelming (pp. 8). Fournier explains that key steps in a testing process generally include GUI testing, unit testing, int...

Issues of Computer Security

Carroll (1995) makes the point that whilst it is possible to establish a reasonable amount of security on the Internet, the way in...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...

NonProfessionals, Health Education, and Computers

In five pages the applications of computers in community and academic settings are evaluated as they relate to the health educatio...

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Home PC Consumer Considerations

This paper considers home personal computer consumer purchasing decisions on three pages. Two sources are cited in the bibliograp...

Digital Era and the Certified Public Accountant's Role

will have to go about it. Largely, these changes are positive and open new doors for those in the field. In focusing in on the ch...

Women in Computers

This paper consists of six pages and discusses female pioneers in the field of computers in a consideration of Grace Murray Hopper...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

Compaq Computer and Supply Chain Management

In six pages this paper examines Compaq Computers in a consideration of the company's supply chain management. Seven sources are ...

Comparative Advantage of Dell Computer

In six pages the personal computer industry and its changes are examined in the responses of corporate giants, Gateway, Compaq, an...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

Gateway and Dell Websites

In seven pages these two computer manufacturers' websites are evaluated with a brief corporate description provided and then an an...

Nursing and Computers

of first-year nursing courses for delivery on the Internet has afforded students the opportunity to complete didactic requirements...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

Apple Computer Inc. and Its Organizational Culture

In twenty pages this paper examines Apple Computer Inc. in a consideration of its organizational culture. There are thirty source...

Maintenance of Computers

cleaned. When computers are exposed to more dust and dirt than a normal computer would be, they should be cleaned more often. In...

Y2K Preparation

In seven pages this paper examines how an individual can prepare for the new millennium in terms of computer preparation. Ten sou...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...