SEARCH RESULTS

YOU WERE LOOKING FOR :Systems Analysis Computer Design and Mathematics

Essays 211 - 240

Stating a Business Case for the Linux Operating System

bits maximum processors 2.4.2 Intel/Cyrix/AMD Pentium, 80486, 80386, 80286 (partial port), 8086 (partial port), IBM/Motorola ...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Computer Law Understanding and the Significance of System Administrators

act maybe hard for the system administrators as it is lengthy, with 75 sections and a total of 16 schedules. However, this...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Project Proposal; A New Computer System for a Retail Firm

more accurately to changes in demand. The implementation of a system, to allow for the different elements of the business to be br...

Why Linux is Better Than Windows

additional cost of hundreds of dollars. Linux is an open source file, which means it is completely free for downloading on its we...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Planning and Assessments for Information Systems Development

the hardware (Avison and Fitzgerald, 2008). The difficulties may also be seen in the difficulty of gain a value as a result of the...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

BUSINESS CONTINUITY PLAN: DATA PROTECTION

In a previous paper, the writer pointed out that illegal intrusion into a database - whether physical or via Internet - is a huge ...

The IS for the Business Placement office at Midstate University

which were available, but insufficient. To examine how and why the initial attempts at developing the system met with problem an...

CAT and SISP - A Review of 2 Articles

evaluation may be useful (Thompson and Weiss, 2011). Once first stage is complete, and the determination that CAT is suitable, the...

Computer Based Crime Reporting

enforcement agencies are faced with the complex problem of having not just to apprehend criminals but also to report what they hav...

Function and Form as They Involve Graphic User Interface

In six pages computer systems are considered in a discussion of graphic user interface function and form. Four sources are cited ...

Marginal Costing and Absorption

In twelve pages activity based marginal costing and absorption are discussed through a basic description followed by a more detail...

An Overdoes of Intravenous Medication and a Change Theory Application

while in the hospital plus the incidence of symptoms and/or disease that would have initially required use of the medication. In ...

WISE System Final Project Plan Improvement for Boston's University of Massachusetts

In seven pages this paper examines how the University of Massachusetts at Boston can improve their online university system's stud...

Computer Accounting System Integration

In three pages this paper examines how to integrate a computer accounting system in a discussion of what factors a company must ex...

Installing Either Linux, Windows 2000, or Windows ME on a New Notebook Computer

In three pages this paper supports installing Windows 2000 as an operating system for a new notebook computer. Five sources are c...

Commercial Environment and Computer System Implementation

In eight pages a case study is used to discuss the problems involved in the development and implementation of a business computer ...

Disabled Computer User Software Programs and Assistive Devices

In 7 pages this paper examines the software programs that make computers more user friendly for disabled individuals in a consider...

Nigeria, the Unites States and ATC Systems

According to statistics provided by the International Federation of Air Line Pilots Associations in 1997, theres a dangerous air t...

Technology and the Criminal Justice System

and foremost, its reliability for identification purposes (Technology and Human Values, 1997). In addition, it is widely used and...

Overview of PKI

In six pages this paper considers computer networking protection through public key infrastructure in this overview that includes ...

Technological Needs of a Home Office

In four pages this report examines what an accountant's home office should include in terms of technology which include a consider...

Analyzing Prudential Insurance Company

In a paper consisting of eleven pages a company history along with a SWOT analysis, discussion of the managerial accounting system...

Digital Era and the Certified Public Accountant's Role

will have to go about it. Largely, these changes are positive and open new doors for those in the field. In focusing in on the ch...

Parliamentary Government and the United States

In six pages this paper examines whether or not the parliamentary system of government should be adopted by the United States in a...