SEARCH RESULTS

YOU WERE LOOKING FOR :Uses of Computer Protocols

Essays 811 - 840

Computer Based Crime Reporting

enforcement agencies are faced with the complex problem of having not just to apprehend criminals but also to report what they hav...

Bio-Psycho-Socio-Cultural-Spiritual Assessment

refers to the persons culture and how that may affect their responses to life events, illness, etc. (University of Pittsburg, 2010...

Proposal for Marketing and Measuring Customer Satisfaction in a Local Company

stated the integrated marketing communications; "is a concept of marketing communications planning that recognises the added value...

Persuasion Analysis of Mac Advertisement

the right side looks like flashes: "It comes with the worlds most advanced OS." The second row shows service techs, images of ap...

Proposal for a New Assessment Model Aimed at Analysis of Information Technology Use within a Firm

which an organisation competes. Porter (1985, p13) has designed two differing categories of competitive advantage; cost advantage ...

Using Moving Averages

the demand data from days 2, 3 and 4 and divides by 3. This is repeated for all the days (except the last day as there are not thr...

Computer Tools and Inappropriate Prescribing for the Elderly

The incidence of inappropriate medication prescriptions issued to elderly individuals is estimated to be between 12 and 40 percent...

Educational Technology and its Many Uses

In a paper of eleven pages, the writer looks at educational technologies. A case study of a sophomore world history class is used ...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

Homeland Security's use of Geographical Information Systems

Homeland Security uses many different forms of technology in their role of protecting the US. One type of technology which is use...

Oppositional Defiant Disorder (ODD), Parenting Style and Delayed Gratification

The writer uses results from research conduced by the student with the aim of assessing whether or not there is a correlation betw...

An Example of Investment Appraisal Using NPV

Net present value is a method used to compare and contrast different potential investments. The process discount future net cash ...

Speech Recognition Medication Dictation Technology

This research paper pertains to speech recognition software that is used in regards to creating medical reports, such as those use...

Making Better Decision than Joe Schmoe

Joe Schmoe was a marketing manager for Clipboard Tablet Co. His decisions for three hand held computer ranges between 2012 and 10...

Analysis Two Major Computer Companies

a dictator. All final decisions were made by him, just like Jobs and like Jobs, he was a micromanager. Dell believed that good pla...

Statistical Testing of Criminal Justice Data

the critical level, this the score against which the test statistic will be assessed to determine whether to accept or reject the ...

Using Array Structure to Develop a Program

has resulted in more than $10,000 in losses last year, and threatens future budgets for the organization. Therefore, it must be ad...

Internet and the Impacts on Post-Secondary Education

in higher education (Lee 137). In Britain, the Internet age appears to be prevalent in urban settings, but there is also a clea...

CAT and SISP - A Review of 2 Articles

evaluation may be useful (Thompson and Weiss, 2011). Once first stage is complete, and the determination that CAT is suitable, the...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

Computer Technology and Effective Educator Communications

use in todays business environment, all of which are appropriate to specific sets of circumstances. The business environment is t...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

International Law and Commerce Issues

Federal Trade Commission, established in 1914 during Woodrow Wilsons term as President (Federal Trade Commission: A History, 2004)...

A Review of How Computers Work

and experts alike will find this book useful. It is mostly geared, however, to the user not to the computer repair technician but...

Dell Inc.

country (Dell Annual Report, 2000). This company has achieved some amazing results, by 2000 the company was selling $50 million a ...