SEARCH RESULTS

YOU WERE LOOKING FOR :eCommerce Strategy of Dell Computer

Essays 1081 - 1110

Protocols of the Current and Next Generation

In ten pages computer networking is examined in terms of an overview of current and next generation protocols and a comparative ev...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Comparative Analysis of Biological and Computer Viruses

viruses have the potential to completely wipe out a computer system. Computer viruses have not, of course been photographed or dr...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Law and Computer Crime

In five pages the federal and state laws created to prevent the increasing instances of computer crime are discussed. Five source...

Importance of Project Manager Retentioin

In seven pages this paper discusses the significance of retaining project managers in order to successfully meet the needs of comp...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Using Technology to Help Teach World History

This 5 page paper discusses ways to use the computer, Internet and other technology to teach world history. The writer argues that...

Education and Computers

In five pages this paper discusses the past and future roles of computers particularly pertaining to Special Education. Four sourc...

Education and Increased Technology Use

In five pages this paper discusses how computer technology has been integrated into the educational curriculum in this considerati...

Computer Industry Development and Competition

In five pages the importance of having more than one computer manufacturer is discussed in terms of competition impact and technol...

Apple Computer Inc. and Its Organizational Culture

In twenty pages this paper examines Apple Computer Inc. in a consideration of its organizational culture. There are thirty source...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Maintenance of Computers

cleaned. When computers are exposed to more dust and dirt than a normal computer would be, they should be cleaned more often. In...

Nursing and Computers

of first-year nursing courses for delivery on the Internet has afforded students the opportunity to complete didactic requirements...

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

Y2K Preparation

In seven pages this paper examines how an individual can prepare for the new millennium in terms of computer preparation. Ten sou...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Computer Design Evolution

In five pages this paper examines how design and art were influenced by the evolution of computers. Four sources are cited in the...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

Place, Space, an the 'Infobahn' in City of Bits by William J. Mitchell

A book report on City of Bits by William J. Mitchell consists of five pages and considers the pervasive social and individual infl...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Firefighting Assistance from Computers

to accurately predict the conditions in which the fire would burn out (Walton, 1985). This revolutionary computer "expert syste...

CPA Company's Computer Software Upgrading

Peachtree itself requires only 486-level capability and Windows 3.1 or Windows 95. However, the data generated by an accounting f...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Cross Curriculum Pros and Cons of Computer Usage

In fifteen pages this paper discusses elementary education and the uses of computers in a consideration of pros and cons. Twenty ...

History and Future of Computer Networking

In eight pages the history of computer networking is discussed along with the importance of operating system choice, policy establ...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...