SEARCH RESULTS

YOU WERE LOOKING FOR :Women in Computers

Essays 1741 - 1770

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...

Methods of Computer Storage

This paper consists of fifteen pages and examines the latest technology involving methods of computer storage with solid state sto...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Technology and its Importance in Business

This paper considers the way technology is at the heart of every business. Computer technology is of particular importance in thi...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Hopkins V. Price Waterhouse

absolve the firm of any culpability served to secure Hopkins victory. The United States Supreme Court heard the appeal and subseq...

Cultural Development Of Vietnamese Women

majority of them helpless to a life of nothing other than self-sacrifice for their homes and families. For Vietnamese women...

Women, Judaism And Anti-Semitism

and reconcile them to the view of what is right would have provided for a more equalizing relationship where Jewry was concerned. ...

Strong Women in Ancient Greek Theatre

the "sheet-anchors," i.e., the weapons that will be their salvation (Aristophanes). Lysistrata gathers together women from all o...

Should Gay And Lesbian Couples Be Allowed To Adopt?

Accordingly, each parent represents a much-needed entity in the growth of a child: The mother provides stability and sanctity, whi...

The Impact Of Women In The Military And Combat Roles

while the men were away at war. However, this particular battle represented a great deal of change within and among the steadfast...

Margaret Sanger

hold a great deal of authority when it comes to changing the attitudes and perspectives of young girls who may believe living off ...

Program/Aiding Adult Female Victims of Childhood Sex Abuse

research shows that the majority of women, and also a percentage of men, who seek treatment for substance abuse disorders indicate...

Gender Roles in American Culture

beyond the domestic sphere into virtually every profession and job category from which they were once barred, they have had to con...

Charlotte Perkins Gilman/The Yellow Wallpaper

A 6 page essay that discusses Charlotte Perkins Gilman's short story, "The Yellow Wallpaper," which continues to capture and fasci...

Management - Glass Ceiling - Managing Oneself

reported that among Fortune 500 companies, women hold 16 percent of corporate officer jobs and 15 percent of Board seats. Among th...

Diverse Views of the Latter Nineteenth Century Black Woman's Experience in Slave Women of the Fields and Charlotte Forten

occurring in this era between slavery and freedom. We learn from both Forten and Schwalm that many African American women were in...

The Computer In Criminalistics

connect him or her to a particular cyber crime. Indeed, policing tactics have vastly improved over the years to include such aspe...