SEARCH RESULTS

YOU WERE LOOKING FOR :Women and Computers

Essays 1501 - 1530

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

DELL INC. AND DISTRIBUTION IN CHINA

statements. Furthermore, Chinese competitors of Dell have somewhat of a singular advantage, that being backing from the Ch...

BUSINESS CONTINUITY PLAN: DATA PROTECTION

In a previous paper, the writer pointed out that illegal intrusion into a database - whether physical or via Internet - is a huge ...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

Personal Finance and the Impact of Technology and Computers

so he/she doesnt have to think about it); have paychecks deposited directly to bank accounts, and even buy other financial instrum...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Development of Autonomic Computing

which the design of an autonomic computer system should be designed, helping increase efficiency as well as overcome the shortage ...

Fuzzy Logic Controllers (FLC) In Computer Systems

However even with this there is no any exactness as this does not mean that it is plus or minus 2 or 3 degrees (Rosenstein, 2004)....

Overview of Computer Crimes

computer terminals, stolen floppy disks with company information, or direct access to the network by individuals, either criminal ...

Culture and Life Influence by the Computer

used, and how it is created in consideration of utility. Campbell (1996) asserted that technological determinism "reflects a utop...

Health Services and the Effects of Computer Technology

health services" (McConnell, 1996). Computers can fill out forms, transfer phone calls and gather data, among many other abilitie...

Literacy Standards Within Nursing Education Programs

thinks is, to a certain extent, a result of genetic influences; however, this capacity is also highly influenced by the process o...

Law Firms and Software Uses

facts ("Summation Products," 2005). In addition to helping lawyers locate important information, it provides links for documents, ...

Smart Clothing and Wearable Computer Technology

between this system and: "passive reminder system (such as a paper organizer) or a context-blind...

Six Questions on Economics Answered

the way no enforceable rights will lead to opportunism. Coases theorem states that property rights give the market stability by al...

'Computer Professionals and the Next Culture of Democracy' by Shuler

may be agents in the transformation of democracy, but democracy is not something that is inextricable with computer science (2001)...

Computer System Development

data needing a broad bandwidth, but also the need for security as patient files are confidential and security measures are not onl...

Stating a Business Case for the Linux Operating System

bits maximum processors 2.4.2 Intel/Cyrix/AMD Pentium, 80486, 80386, 80286 (partial port), 8086 (partial port), IBM/Motorola ...

Workplace Computer Training

somehow to computers and the internet" (Survival Skills for the High School Graduate, 2005). They stress that any and every indivi...

Microsoft Trial and Arguments

monopoly" (Brinkley, 2000). (This isnt unknown business practice; Detroit routinely buys up inventions that might lead to more fu...

Importance of Access to Antivirus Computer Software

network to accomplish that goal. Still others may transfer files between the companys network and their home computers, work on t...

Dell Computers 2003 A SWOT Analysis

both computer components and actual PC computers. He did so by buying retailers surplus stocks at cost, powered them up with graph...

Computers and China

particular market, partly because of culture, and partly because the demand, until recently, simply hasnt been there. Dell Compute...

Globalization Training at Dell Computers

employees and managers to think globally, through the realm of technology. We chose Dell because it is one of the few companies in...

Mac Computer Marketing

B, 2004). The ad was strange, to say the least. It was drab, it was in black and white until the woman burst on to the screen and...

Proposition for a School iBook Upgrade

time while currently gaining the greatest utility from the hardware it has and is about to acquire. The Mac OS X Server v10...

Ireland and China's ICT Industries

the same time, when choosing an environment in which to do business, it pays to look at the industries in both nations as well as ...

Plastics Industry and Computers

industry today makes use of computers, it perhaps could use it even more. Siweck observes: "...American shops need to understand t...