SEARCH RESULTS

YOU WERE LOOKING FOR :Technological Impact of Computers on Society

Essays 1051 - 1080

Human Resource Management at a Telecommunications Company

high level of reliance on technical skills of relatively few employees as well as services standards, at both customer contact poi...

The Unanticipated Impacts of the No Child Left Behind Act

Act introduces as many problems into the educational arena as it does solutions. Two of the more controversial of its provision...

The Influence of Humans on the Pace of Climate Change

A major influence is being increased waste and pollution as a result of burning fossil fuels, such as coal and oil (GERIO, 1997). ...

Neoliberal, Radical and Transformationalist Approaches to Explain the Way Globalization Impacts on Culture

as embracing more than simply the practice of international trade. A useful definition comes from Lubber and Koorevaar, (1998) who...

Environmental Regulations and Business Practices

a great deal of debate. On one hand, business people claim that obeying all the regulations can be onerous, and may eventually for...

The Impact of the Kentucky Trilogy and Generational Cohorts on Nursing

example charge nurses may make assignments in terms of patients to different style for the shift, there will not necessarily be in...

BUSINESS CONTINUITY PLAN: DATA PROTECTION

In a previous paper, the writer pointed out that illegal intrusion into a database - whether physical or via Internet - is a huge ...

The Impact of Global Warming on a Business

their impact is felt by 70% of the population were effected to a significant level (Saporito, 2001). The emissions made ar...

Potential Economic Influences on Starbucks

income, which will provide the scenario for increased demand, as long as the company satisfying consumer demands in terms of produ...

Soccer, Culture and Identity

was that team members would be consistent, playing for an entire season, which would engender the building of self esteem, with th...

Balancing Loops and reinforcing Loops in the Service Industries

1 Figure 1 Balancing feedback loop In this loop it is possible to see how if there is an improvement in the quality of the servi...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Manufacturing and Adopting Pull Based Principles

In five pages this paper examines an established computer manufacturer's adoption of pull based techniques in an assessment of the...

New Ways of Investigating Street Crime

waiting for the "perp" to arrive on the scene. Community policing, a form of urban law enforcement, is a restructuring plan that ...

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

Gregory J.E. Rawlins' 'Slaves of the Machine'

A paper that consists of a 5 page book summary and considers that the computer is the master of the human mind despite being man m...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Disabled Computer User Software Programs and Assistive Devices

In 7 pages this paper examines the software programs that make computers more user friendly for disabled individuals in a consider...

The Safety of Air Bag Use

or she may in fact be killed by an air bag ("In the" 2). The agency explained that children under 13 should not ride in the front...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

Stroke Patients, Traditional Use versus Forced Use of Involved Extremities in the Long Term

In eight pages this paper discusses the long term functionality impact of using extremities impacted by a cerebral vascular accide...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Classroom Uses of Computers

In nine pages the ways in which computer technology has been integrated into the classroom are examined in terms of the benefits i...

Overview of Hydrodynamic Hull Testing Development

In ten pages this paper presents the development of hydrodynamic hull testing in an overview that includes history, technology, co...

Women in Computers

This paper consists of six pages and discusses female pioneers in the field of computers in a consideration of Grace Murray Hopper...