SEARCH RESULTS

YOU WERE LOOKING FOR :Uses of Computer Protocols

Essays 751 - 780

MMPI an Overview

The MMPI is the most commonly used assessment for its purpose, which is to assess personality traits. The design of the instrument...

Public Leaders

This essay describes and discusses four leadership styles that could be used in private or public settings. The behaviors of leade...

Reading Text: Electronic Versus Paper

This 5 page paper gives an explanation of reading electronic text versus reading hard copy text. This paper includes studies about...

SEABREEZE'S VIRTUALIZATION PROPOSAL

Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...

4 Ps and New Product

This paper presents a case study about a brewery that wants to introduce a non-alcoholic beer to the market and uses the 4Ps metho...

Technology and Work from a Woman's Perspective

In five pages this paper examines how women can make employment use of technological advancements and computer networking. Two so...

Indian International IT Company Satyam Computer Services, Ltd.

Additionally, Satyam has forged numerous alliances over the years, including with IBM, Siebel and Microsoft. Satyams U.S. subsidia...

Computer Industry Development and the Invention of Printed Circuit Boards

This paper examines the impact of the printed circuit board invention upon both contemporary society as well as the computer indus...

The Handheld Electronic Device

A proposal for a palm computer that contains cellular phone service is discussed in the context of this ten page paper that includ...

2001 COBOL

In a paper consisting of ten pages the COBOL computer programming language is considered as of 2001 along with speculation as to w...

Types of Computer Programming Languages and Basic Information

In five pages computer programming language types such as object oriented, imperative, logic, and functional are discussed. Four ...

Workplace VDUs and Safety Issues

Using computers of course does also warrant care and attention to ergonomics. There are many complaints that stem from sitting in ...

New Software and Computer Purchaes

In eight pages this paper examines the prices and capabilities of antivirus software and computers in a consideration of the Sys P...

Advent of WebTV

This paper considers how little in the way of computer knowledge is needed to use WebTV in eight pages. Seven sources are cited i...

Challenges Organizations Face

This essay identifies some of the many risks and challenges organizations and businesses face. This includes things like being hac...

Customer Service from the Perceptions of Customers

In ten pages this paper discuses the differences between the way customers may view customer service and organizational perspectiv...

School Children, Internet, and Computer Classes

everywhere - in the workplace, in libraries, and in the home. According to a 1998 commercial survey, some 60 percent of American ...

4 Methodologies for Information Systems Development

In nine pages information systems development is examined in a consideration of four methodologies including Information Systems w...

Social Revolution and Computer Technology

has been characterized by a constant stream of evolving products, innovative methods of production, and dynamic means of distribut...

Financial Report Information on Apple Computers, Inc.

Fourth quarter 1999 through third quarter 2001 reports are utilized in this five page financial analysis of Apple Computers which ...

The Influence of Music on Trahce in African Tradition Religions

The writer presents an examination of the role music plays in trance. The paper looks at both shamanic and possession trance, the ...

Statistical Testing of Criminal Justice Data

the critical level, this the score against which the test statistic will be assessed to determine whether to accept or reject the ...

Educational Technology and its Many Uses

In a paper of eleven pages, the writer looks at educational technologies. A case study of a sophomore world history class is used ...

Analysis Two Major Computer Companies

a dictator. All final decisions were made by him, just like Jobs and like Jobs, he was a micromanager. Dell believed that good pla...

Homeland Security's use of Geographical Information Systems

Homeland Security uses many different forms of technology in their role of protecting the US. One type of technology which is use...

Oppositional Defiant Disorder (ODD), Parenting Style and Delayed Gratification

The writer uses results from research conduced by the student with the aim of assessing whether or not there is a correlation betw...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Psychodynamic Theories in Workplace

We know personality theories are used but psychodynamic theories have also been adopted in one way or another in organizations of ...

The Concept of Criminal

This essay reports different definitions of the concept of criminal as it is used as a noun and has an adjective. One of the ways ...