SEARCH RESULTS

YOU WERE LOOKING FOR :Societal Impact of Computer Technology

Essays 1351 - 1380

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Memorandum on Computer Security

XP commands "netstat" and "tasklist". By running these commands, one can swiftly access critical information about the processes r...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Marketing to the International Community

Culture is important for a business to consider in international marketing, but also such mundane issues as electrical service and...

Hong Kong Presence of Dell Computers

In twenty pages this paper considers how Dell Computers can develop a strong market presence in Hong Kong, where the economy is ai...

India, Computers, and Girls

girls will continue to be stricken from the progress of modern technology. School girls can only gain the requisite confidence to...

Morocco's CasaComputer Marketing

In twenty seven pages this paper presents a plan for Morocco marketing of computers that are made in the United States in a consid...

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...

Computers or Books in Education

The book is incredibly low-maintenance, never requiring that it be rebooted or upgraded. Books can travel with the individual and...

Testing and Integration of Computer Systems

network, after all, is to transport and control data, and to connect computers and peripheral drives with one another (Huber and B...

Costs and Benefits of Computer Mediated Communication

There have been some expected benefits that have also proven to be false expectations. It was expected that computer based communi...

Dell Inc.

country (Dell Annual Report, 2000). This company has achieved some amazing results, by 2000 the company was selling $50 million a ...

Project Proposal; A New Computer System for a Retail Firm

more accurately to changes in demand. The implementation of a system, to allow for the different elements of the business to be br...

Plastics Industry and Computers

industry today makes use of computers, it perhaps could use it even more. Siweck observes: "...American shops need to understand t...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

International Law and Commerce Issues

Federal Trade Commission, established in 1914 during Woodrow Wilsons term as President (Federal Trade Commission: A History, 2004)...

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Mobile Printer Product Management Plan

Product Protocol 12 The Marketing Mix 13 SWOT Analysis 14 Strengths 14 Weaknesses 14 Opportunities 14 Threats 14 Development 14 La...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

The Coco Store and HCI Theory

includes the perceptions and reactions of the reviewer. Biological and cognitive basis for perception According to Greenberg (19...

The Coco Store Website's Interface Design

taking advantage of users intuition and prior experience. Background information What is a human-computer interface? In regards ...