SEARCH RESULTS

YOU WERE LOOKING FOR :Types of Computer Viruses

Essays 121 - 150

Saudi Arabia and Apple Computers

of extremely successful computers, which brought its U.S. market share back up to 10%. Overseas, it has maintained dominance, howe...

Computer Science Majors and Computers

Core computer curriculum is discussed in six pages as it pertains to a computer scienc major with an emphasis upon getting back to...

Criminal Justice and Computers

In five pages the criminal justice system is examined in terms of the significant impact of computers with FBI investigations of o...

Entertainment and Computers

In six pages the entertainment industry is examined with the effects of the personal computer and how computers can be utilized as...

Competition Between Compaq and Dell Computers

In six pages this paper examines whether Dell Computer will take advantage of Compaq's difficulties and become the largest persona...

Apple Computer's Changing Fortunes

In ten pages the ongoing saga of Apple Computer's management shortcomings is presented. Ten sources are cited in the bibliography...

Graphic Design and Color

production of light by some source; the modification of this light by the illuminated object; the optics and physiology of the eye...

Evolution of Computer Technology

In four pages computer evolution is traced from the 500 B.C. abacus to contemporary desktop computers. Four sources are cited in ...

Medical Technology and Computers

In seven pages medicine and its computer history are considered with such concepts as telemedicine, computer aided surgery, and 'v...

Tactics to Minimize Computer Crimes

'Cracking' and 'hacking' are among the topics discussed in this examination of computer systems and unauthorized access consisting...

Nursing Student Instruction, Lecture Method or Computer Assisted Learning

In forty pages the instruction of nursing students is considered in an examination of computer assisted learning and lecture metho...

Classrooms and Computers

In ten pages utilizing computers in a classroom setting is discussed in terms of its advantages and the ways in which computers ca...

Libraries and Censorship Filters

content specifically set out in the CIPA statue;... 2. Certain broad categories of content--among them journalistic, medical, educ...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

American Leadership as Personified by Steve Jobs and Virginia Henderson

CP/M, which was shortly to be succeeded by MS/DOS (Alsop 188). The Macintosh operating system offered an icon-driven system that a...

Computer History and Their Impact on Society

This research paper offers a comprehensive overview of the development of computers. Then, the writer discusses the impact that co...

Profiles IBM Apple Dell

This essay provides a brief history and recent performance of IBM, Dell, and Apple Computer. The paper begins with a discussion of...

Computer Technology in the Classroom: Advantages and Disadvantages

Instructional technology has been in a state of evolution throughout history. In the latter part of the twentieth century, howeve...

Buying a Laptop

for this we need to consider the different uses. * The general use will be as a family laptop, rather than in a business environme...

Epidemiology And Infectious Disease Prevention: West Nile Virus

individual who had West Nile virus (Altman, 2002). The disease, which spreads by a bite from an infected mosquito, can be inflict...

Summer of 1999 New York Outbreak of West Nile Encephalitis

epidemic of brain inflammation in and around New York City during the summer of 1999 was in fact West Nile virus (Enserink, 1999b)...

The Organizational Use of Email Its Advantages and Problems

of in days or at great cost with international courier services (Scott, 2002). A survey conducted by Vault.com revealed that more...

HIV

New York and California among homosexual males and intravenous drug users. New cases soon were discoverded in many regions of the...

'Supermolecular Machine' Cell

viruses more successful and therefore more dangerous from the point of view of the hosts. As Rybicki (2001) notes, viruses ...

HPV Policy in a Nationwide Chain of Health Clinics

sexually active. There have been numerous attempts around the nation to make HPV vaccination mandatory. Unfortunately, many of t...

Viruses and Microsoft's Susceptibility

networks are closed so that no outside commands can usurp the original. Windows is kinder and gentler and as a result its open doo...

Access to Health Care and the Discrimination and Stigma of HIV and AIDS

on coverage based in what has been deemed "pre-existing conditions" and to refuse coverage to individuals based on everything from...

The Hot Zone by Richard Preston

In five pages this paper discusses the Ebola virus that is the focus of Richard Preston's horrifying text. There are no sources l...

Microbiological Comparison between Cook's Outbreak Film and Richard Preston's Hot Zone Novel

In four pages this paper contrasts and compares how the Marburg and Ebola viruses are depicted in this movie and book. Seven sour...

Overview of Epstein Barr Virus

In seven pages Epstein Barr Virus is examined in an overview that discusses how it is associated with such physiological maladies ...