SEARCH RESULTS

YOU WERE LOOKING FOR :Using Computer Networks and Security Issues

Essays 601 - 630

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Discussion Questions on Cyber Security

In a paper of four pages, the writer looks at cyber security discussion questions. Topics such as spyware and adware are addressed...

Security Measures in Operating Systems

In a paper of twelve pages, the writer looks at security measures for operating systems. A variety of such measures are compared a...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Mother's Letter Goes Viral

Social media networking is a way of life for many people. While these networks can help people stay connected, they can also cause...

Business World, Computability, and Machine Languages

the work, or the game, or the information beyond the commands and the toolbars. He or she knows the limits of what the computer c...

The Significance of Computer-Aided System Engineering Tools

The writer describes the use of computer-aided system engineering (CASE) tools and their significance for business. The writer arg...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...

European Security Issues

In twelve pages this paper examines the regional change impact upon European security with NATO's and the EU's roles also consider...

Twenty First Century Computer Counseling

In nine pages this research paper discusses therapy, counseling, and how computers are being used with a consideration of such pra...

Elementary Education, Computers, and Test Scores

In eight pages this paper considers how using computers in elementary school classrooms produce benefits including assisting stude...

Field of Computer Graphics

Computer graphics are defined along with a discussion of its business and entertainment uses in a research paper consisting of fiv...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Cross Curriculum Pros and Cons of Computer Usage

In fifteen pages this paper discusses elementary education and the uses of computers in a consideration of pros and cons. Twenty ...

Computer Use and Learning Principles

In five pages this report discusses how basic learning principles can be applied to using a computer. Five sources are cited in t...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Technology Questions

In five pages a Q and A format is used to answer 2 questions posed by a student regarding health care professionals and the import...

Types of Computer Programming Languages

of that market. The very first programming languages, back in the...

Kuwait's National Security Issues

Government does challenge the border on occasion ("Kuwait," 2003). Iraq had been a threat long after the Gulf War. Yet, although ...

Security in Schools and Technology

in schools can solve all problems, but that it can be used to benefit schools if used properly: "National School Safety and Securi...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...