SEARCH RESULTS

YOU WERE LOOKING FOR :Uses of Computer Protocols

Essays 151 - 180

Plastics Industry and Computers

industry today makes use of computers, it perhaps could use it even more. Siweck observes: "...American shops need to understand t...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....

Dell - A Case Study

U.K. and Canada, and the company is aggressively pushing into Asia and Europe (Gibbs 35). The role of formal knowledge in develop...

Case Study on Decision Making

the different aspects will be considered, rather than a single item gaining a disproportional relevance. Question 2 After readi...

Types of Computer Programming Languages

of that market. The very first programming languages, back in the...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

IWB-Latest technology for Schools

of programs and resources but there is still evidence that teachers are not using them to their full potential. One of the reasons...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

The Importance of Computers in the Food and Beverage Industry

numbers, or planning, computers can assist management in a variety of things. Not only is management provided with advantages with...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

Laws and Regulations Governing the Use of Animals

be made for that ideology with some animals but "Virtually every major medical advance of the last century has depended upon resea...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Glossary of Network Protocols

rather amazing to imagine how the computer works in the first place. There are so many intricacies that make the computers run. Mo...

Windows 2000 and Kerberos Authentication Protocol

seek to misrepresent their identity or to masquerade as another user only need access to public-key encryption codes to gain acces...