SEARCH RESULTS

YOU WERE LOOKING FOR :Using Computer Networks and Security Issues

Essays 601 - 630

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

Case Study on Decision Making

the different aspects will be considered, rather than a single item gaining a disproportional relevance. Question 2 After readi...

IMO's ISPS Code and International Maritime Security Issues

after 9/11, William A. ONeil, the Secretary-General of the IMO, proposed a "Review of Measures and Procedures to Prevent Acts of T...

Computer Programming and the Hashing Function

Integer. Represented as a word or pair of words. Early Use As stated above, hashing in its early days was used primarily...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Dell - A Case Study

U.K. and Canada, and the company is aggressively pushing into Asia and Europe (Gibbs 35). The role of formal knowledge in develop...

Aviation Safety and Computer Simulation

real-time computing is essential within military aviation systems. The ongoing threat of global discord warrants military utiliza...

Technology Questions

In five pages a Q and A format is used to answer 2 questions posed by a student regarding health care professionals and the import...

Issues of Airport Security Since September 11th Attacks

While many people are happy about the new attention to safety, others are upset. In recent times, as a result of new policies, of...

Internet Information Basics

In a paper consisting of ten pages the ways in which the Internet can be used are examined with its historical development first c...

Types of Computer Programming Languages

of that market. The very first programming languages, back in the...

Kuwait's National Security Issues

Government does challenge the border on occasion ("Kuwait," 2003). Iraq had been a threat long after the Gulf War. Yet, although ...

Security in Schools and Technology

in schools can solve all problems, but that it can be used to benefit schools if used properly: "National School Safety and Securi...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Organizational Issues and Computer Programming

Greco (1998), in discussing this topic, explains that the new loyalty is one where the individual is loyal to himself as opposed t...

IWB-Latest technology for Schools

of programs and resources but there is still evidence that teachers are not using them to their full potential. One of the reasons...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...