SEARCH RESULTS

YOU WERE LOOKING FOR :Workplace Computer Training

Essays 1441 - 1470

A Feasibility Study of Marketing Economics in Spain

This paper examines marketing concepts pertinent to a multinational computer company entering into business in Spain. This ten pa...

Business World, Computability, and Machine Languages

the work, or the game, or the information beyond the commands and the toolbars. He or she knows the limits of what the computer c...

Retirement Planning and Gender Differences

In six pages this paper examines how differences in gender can affect planning for retirement and includes such issues as the work...

Information Systems and Computer Management Planning Issues

This paper consists of five pages and examines management of computer or information systems management and the management issues ...

Workplace, Technology, and Privacy Laws

In twenty pages this paper discusses the U.S. workplace and how technology has impacted upon employee rights and generated many le...

Distributed Computer Databases

In nine pages this research paper examines distributed computer databases in terms of their history, how they are applied, design ...

Proposal for a Small Business Management Information System

In fifteen pages this paper examines how a small business can create a management information system to meet its need in a proposa...

Competitive Workplace and Changes in Office Automation

In six pages this research paper discusses the competitive workplace and the ways in which office automation is constantly changin...

Contemporary Society, the Workplace, and Sexism

usually has some sort of grudge against the member of the opposite sex, or at least feels that the opposite sex in general is infe...

Workplace and Transsexual Issues

that the European Sex Discrimination Act will be rewritten to specifically address the concerns of transsexuals in the workplace. ...

Workplace Cultural Variations

Two articles are discussed in six pages regarding how they reflect the global workplace and cultural variations and the impact of ...

Business Safety and OSHA

In five pages this paper examines OSHA in a consideration of its regulations regarding hazardous materials and its contributions t...

'Voluntary Protection Plans' of the Occupational Health and Safety Association

In ten pages these 'voluntary protection plans' as devised by OSHA to maintain workplace safety are examined. Ten sources are cit...

OSHA and Hearing Loss Related to Noise

In nine pages this paper examines the loss of hearing in the workplace and how OSHA intends to regulate this damaging noise. Ten ...

Workplace Policies on Smoking and the Spiral Theory of Silence

In six pages this paper discusses the Florida state workplace smoking policies within the context of the spiral theory of silence....

The Significance of Computer-Aided System Engineering Tools

The writer describes the use of computer-aided system engineering (CASE) tools and their significance for business. The writer arg...

LAN Computer Network Construction

In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniq...

Security Issues and Computer Network Management

In thirty pages this research study examines corporate computer network management and issues related to security and information ...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

Antitrust Regulation and its Direction

In eight pages the direction of the United States' antitrust regulation is analyzed in a discussion of the long distance telephone...

Simplification of the Process of Computer Shopping

In five pages this paper presents a spreadsheet which demonstrates how computer shopping can be simplified. There are no sources ...

1990s' Personal Computer Shopping

In four pages this paper discusses what must be considered in shopping for a personal computer in the 1990s with such topics as IS...

Computer Consulting Business Startup

In five pages this paper presents an analysis of a computer consulting business startup in terms of financial and research conside...

Case Study on Computer Consulting

In nine pages a case study of CompuGear Inc. is considered in terms of current issues facing a professional computer consulting fi...

Government Branches and Computer Industry Alliances

In five pages the significance of government and computer industry alliances is discussed with such results considered as software...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Law and Computer Crime

In five pages the federal and state laws created to prevent the increasing instances of computer crime are discussed. Five source...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Comparison of UNIX, OS2, and Windows Computer Operating Systems

In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a c...