SEARCH RESULTS

YOU WERE LOOKING FOR :The Nature of a Computer Programmer

Essays 1 - 30

A T.A. Stearns' Virtual Team

Two of the programmers considered entering the technique as an employee suggestion, for which the company pays cash awards. The v...

Performance Criteria Assessment

give far less satisfactory results than does the performance evaluation. Kniggendorf (1998) reports that many "supervisors resist...

Programmers' Empowerment

Years of tradition dictate that the root of employee motivation is money, that employees will work harder and more productively ju...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...

Computers and Their Early History

In five pages the computer's early history is discussed. Five sources are cited in the bibliography....

Primitive Cultures in Documentaries Cannibal Tours, Onka's Big Moka, and Dead Birds

In six pages this paper discusses human nature's dark side as revealed in this trio of primitive culture documentaries....

Birth Defects and Vitamin A Overuse

In five pages this paper discusses how birth defects including those involving the cranial neural crest and retinal issues can be ...

Perspectives on Human Nature

the pagan world, sex was considered a divine gift and it carried none of the sense of sin and punishment that became associated wi...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Computer Technology and Art

the diversity and liveliness of the culture of the time. One could...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

The Potential benefit Of M&A's in Supporting Nigerian Economic Growth

During the early 20th century merger and acquisition (M&A) activity in the United States provided one of the tools for economic gr...

Model A’s, Model T’s, and the Changing Face of America

few weeks later, the company sold its first automobile, to a doctor in Detroit (Davis). As noted above, the company produced 1,700...

Nanotechnology: Role In Speeding Up Computers

every aspect of human life. There is no denying the computers very presence has drastically altered mans existence since it came ...

Alfie Kohn's The Trouble with Gold Stars, Incentive Plans, A's, Praise, and Other Bribes

reward. He has been joined by a number of other theorist, each of whom present their own social cognitive theories. Several of t...

Software Engineering Practice and Professional Ethics

from discriminatory practices in the past. The proposed hiring policy of the Kosovo immigrant is a positive action directed towar...