SEARCH RESULTS

YOU WERE LOOKING FOR :The Histroy of Modern Computers

Essays 541 - 570

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Example of Nonverbal Communication

This research paper utilizes an excerpt from the sitcom Modern Family to describe several aspects of nonverbal communication. Affe...

Food Commoditization and the Capitalist Exploitation of Culture

In a paper of nine pages, the writer looks at food markets and cultural exploitation by capitalist speculation. Historical and mod...

Decision Support Systems - A Review of Literature

from the 1960s to the 1980s were management-centric, and utilized an information paradigm wherein accounting and information were ...

Odysseus and Models of Heroism

In a paper of five pages, the writer looks at heroism. Odysseus is put forth as an example of both modern and classical ideals of ...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Samurais, 2 Books

This essay pertains to two texts that relate samurai culture, The Last Samurai by Mark Ravina and Bushido, the Way of the Samurai,...

Local Government and Its Importance

In a paper of five pages, the writer looks at local government. Different forms of historical local government structure are analy...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

The influence of Francisco de Haro on San Francisco

Before California within the hands of the Americans, it was a Mexican territory, with the Mexican soldier Francisco de Haro being...

Juvenile Delinquency and Causes

In a paper of seven pages, the writer looks at juvenile delinquency. Modern trends and historical causes alike are examined. Paper...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Reproduction Issues

This paper discusses several issues. It begins by comparing the classic Hippocratic Oath to the modern version. The next section d...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Pressfield's Gates of Fire

the often did not take part in battles. It was assumed that the homefront was theirs to protect while the men moved forward. As...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

Sociology's Father Auguste Comte

"a system that was built on an intellectual and moral basis and allowed for science...

Classrooms, Technology, and Teacher Education

may inevitably have to use. The Problem Statement Increasingly, the use of microcomputers in the classroom setting has bee...

Comparing Classical Sociologists Durkheim, Weber, and Marx

bureaus having endless lines and ridiculous regulations, it seems that Webers theory is quite appropriate in the analysis of moder...

Election Process Impact of Computers

willing to give. "The chief problem with paper is that it takes too long to count thousands or millions of ballots. We are just ...

Computer Law Understanding and the Significance of System Administrators

act maybe hard for the system administrators as it is lengthy, with 75 sections and a total of 16 schedules. However, this...

Master of Liberal Arts' Program Letter of Educational Intent

no study of economics can be complete without including a focus on the issues of globalization. Whereas companies sought to enter...

International Law and Commerce Issues

Federal Trade Commission, established in 1914 during Woodrow Wilsons term as President (Federal Trade Commission: A History, 2004)...

Kama Sutra and Modernity

should be respected. While it appears that the religious book is the brunt of jokes and disrespect in a world looking for interest...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....