SEARCH RESULTS

YOU WERE LOOKING FOR :The Histroy of Modern Computers

Essays 1261 - 1290

Self and Identity in the Art of Trish Morrisey and Cindy Sherman

Sherman Cindy Shermans work has often been noted as focusing on issues and questions of identity through a sort of self-por...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Health Services and the Effects of Computer Technology

health services" (McConnell, 1996). Computers can fill out forms, transfer phone calls and gather data, among many other abilitie...

Literacy Standards Within Nursing Education Programs

thinks is, to a certain extent, a result of genetic influences; however, this capacity is also highly influenced by the process o...

Contemporary America and Brave New World by Aldous Huxley

London societys most important government agency was Hatcheries and Conditioning, and its Director seemed to wield more power than...

The Career and Writings of Evangelist Carl F.H. Henry

pursuits out of fear of being contaminated by criticism of the Bible or by the increasing tendency of universities to turn away fr...

Personal Finance and the Impact of Technology and Computers

so he/she doesnt have to think about it); have paychecks deposited directly to bank accounts, and even buy other financial instrum...

Law Firms and Software Uses

facts ("Summation Products," 2005). In addition to helping lawyers locate important information, it provides links for documents, ...

Smart Clothing and Wearable Computer Technology

between this system and: "passive reminder system (such as a paper organizer) or a context-blind...

Overview of Computer Crimes

computer terminals, stolen floppy disks with company information, or direct access to the network by individuals, either criminal ...

Culture and Life Influence by the Computer

used, and how it is created in consideration of utility. Campbell (1996) asserted that technological determinism "reflects a utop...

Workplace Computer Training

somehow to computers and the internet" (Survival Skills for the High School Graduate, 2005). They stress that any and every indivi...

Mac Computer Marketing

B, 2004). The ad was strange, to say the least. It was drab, it was in black and white until the woman burst on to the screen and...

Contemporary Business and UK Common Law's Advantages and Disadvantages

formed the basis of whet we now refer to as common law. The principle source of law currently is that of legislation....

Architecture of the Holocaust Museum and the AT&T Headquarters

image of the International Style, there was an interest in restoring the status of old architectural styles and combining them wit...

Microsoft Trial and Arguments

monopoly" (Brinkley, 2000). (This isnt unknown business practice; Detroit routinely buys up inventions that might lead to more fu...

Importance of Access to Antivirus Computer Software

network to accomplish that goal. Still others may transfer files between the companys network and their home computers, work on t...

Dell Computers 2003 A SWOT Analysis

both computer components and actual PC computers. He did so by buying retailers surplus stocks at cost, powered them up with graph...

Contemporary Society and Love

become separate" (p.48). An interest point is made as Fromm investigates erotic love. Today, many equate eroticism with romanticis...

Computers and China

particular market, partly because of culture, and partly because the demand, until recently, simply hasnt been there. Dell Compute...

Globalization Training at Dell Computers

employees and managers to think globally, through the realm of technology. We chose Dell because it is one of the few companies in...

America as Viewed by Jonathan Swift

convinced that they have achieved unity between these often disparate political entities despite the obvious fact that nothing cou...

Pressfield's Gates of Fire

the often did not take part in battles. It was assumed that the homefront was theirs to protect while the men moved forward. As...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

Sociology's Father Auguste Comte

"a system that was built on an intellectual and moral basis and allowed for science...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

The Coco Store and HCI Theory

includes the perceptions and reactions of the reviewer. Biological and cognitive basis for perception According to Greenberg (19...