SEARCH RESULTS

YOU WERE LOOKING FOR :Workplace Computer Training

Essays 1111 - 1140

Workplace and Barriers to Multicultural Communication

when it comes to addressing different cultural variables (Sabo 26). An example is that it may not be polite to look another in the...

Issues of Employment Learning and Loyalty

development of innovation, and at the very least a higher level of compliance and co-operation (Huczyniski and Buchanan, 1996). W...

Health Services and the Effects of Computer Technology

health services" (McConnell, 1996). Computers can fill out forms, transfer phone calls and gather data, among many other abilitie...

Literacy Standards Within Nursing Education Programs

thinks is, to a certain extent, a result of genetic influences; however, this capacity is also highly influenced by the process o...

Overview of Computer Crimes

computer terminals, stolen floppy disks with company information, or direct access to the network by individuals, either criminal ...

Culture and Life Influence by the Computer

used, and how it is created in consideration of utility. Campbell (1996) asserted that technological determinism "reflects a utop...

Alan Cavaiola and Neil Lavender's 'Toxic Coworkers: How to Deal with Dysfunctional People on the Job'

make a primarily positive impact or a primarily negative impact in the workplace. Workplace productivity is affected by a...

Overview of a Computer Internship Essay

certain jobs, and that the workplace environment and the job focus reflect elements of personality. The personality types of job ...

Power and Management

the request as well as the actual request (French and Raven, 1959). This is seen in the different level of management and basic mo...

Procedure and Criminal Law II

The definition of felony murder is that it is a killing that is unintentional, occurring "during the commission or attempted commi...

Employment, Politics, and Power

and the development of scientific management the division of labour was based on craft, with craftsmen being granted complete disc...

Engineering Products, Politics and Power

divided this process of the development of culture and its maintenance into six steps which need to be followed in order to create...

Types of Computer Viruses

piggybacks on other real programs is known as a virus (Brain, 2005). For example, a virus could attach itself to a spreadsheet pr...

Gender Bias and the Workplace

scores are as follows: * Expectation of Privilege 24 * Preference for Similarity 11 * Preference for Control 14 Based on th...

Issue of Workplace Diversity

sites have multi-lingual capacity (Johnson-Reece, 2004). Its also imperative that when the company makes any decisions about thei...

Overview of the Merger Between IBM and Lenovo

The sharp decline in sales was expected following the turn of the new century as many businesses rushed to replace aging PCs with ...

Women Receiving Unequal Pay in a White Collar Workplace

of female lawyers, bias against women remains entrenched in the legal profession and results in steep inequities of pay" (Gibelman...

Human Capital and its Intrinsic Value

the idea of human capital. Even motivation theories from people such as Taylor and Mayo and the way they thought the best value ma...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Dual Career Employees Case Study and Human Resources

action will apply to all facets of XYZs employment practices which include but will not be limited to, recruiting practices, hirin...

Workplace Obscene Language, Name Calling, and its Negative Impact

invite more personal discussions and verbal altercations are somewhat acceptable. Interestingly, on that show, a woman came on boa...

Aviation Safety and CAD Uses

level of liability on the part of the airline company and the aircraft builders, there is a great deal of motivation to find ways ...

Insurance Agencies and Sex Change Operations

(Zambito, 1995, p. C01). Gustons research has shown "that courts have forced insurance carriers to pay if the procedure is deemed...

A Feasibility Study for a Computer Orientation Club

basis. There are many areas of computing that are either not covered by the more formal channels or areas where additional help is...

Marketing Strategies Dell vs. Apple Mac

to the overhead luggage compartment and bringing down his G4 iBook, then, Troyer pulls his G4 iBook from under the seat (Lipperts,...

Computer Consulting Business Rapid Client Acquisitions

to sit for hours and call potential clients. Lists may be acquired through various sources. To comprehend each of the methods, it ...

Colombia and the Marketing of Computers

There were 488 radio stations in Colombia in 1999, 454 AM and 34 FM, as well as 60 television broadcast stations (Colombia). Thou...

A Workplace Article Reviewed as Part of a Series of Eight

that reduce the opportunity for negative managerial responses to issues of diversity. The two main theories that are assessed in ...

Publius Case Study

retrieve the document, hed go to a directory kept on "a Publius-affiliated Web site" and then the "network itself would do the wor...

Conflict and Work Related Violence

to face threats and threats delivered by e-mail (twenty-four percent) to acts such as the downloading of computer viruses (sevente...