SEARCH RESULTS

YOU WERE LOOKING FOR :Computer

Essays 571 - 600

Need a Brand New Custom Essay Now?  click here
Do Computers Have Creative Ability? An Artificial Intelligence Consideration

on the scene. Certainly the case is silly, but once, we thought computers were frivolous as well. Since we have come to...

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl

and Computer Law: Cases-Comments-Questions", a casebook compiled by authors Peter B. Maggs, John T. Soma, and James A. Sprowl, out...

If the Industrial and Computer Revolutions Had Occurred at the Same Time, What Would Have Happened?

one might readily surmise how the repulsion exhibited by the masses would have been akin to the reaction received when Sputnik was...

Project Proposal; A New Computer System for a Retail Firm

more accurately to changes in demand. The implementation of a system, to allow for the different elements of the business to be br...

India as a Market for PC Sales

In seven pages this research paper discusses computer sales in a consideration of India's personal computer market. Six sources a...

Animation in 3D

for a 2D presentation is called cel animation (Doyle, 2001). The third dimension is added through the processes of modeling, text...

American Leadership as Personified by Steve Jobs and Virginia Henderson

CP/M, which was shortly to be succeeded by MS/DOS (Alsop 188). The Macintosh operating system offered an icon-driven system that a...

Buying a Laptop

for this we need to consider the different uses. * The general use will be as a family laptop, rather than in a business environme...

Russia Sales and IBM

In six pages this paper answers questions having to do with IBM's sale of a super computer and 16 computer work stations to a nucl...

Graphic Design and Color

production of light by some source; the modification of this light by the illuminated object; the optics and physiology of the eye...

Libraries and Censorship Filters

content specifically set out in the CIPA statue;... 2. Certain broad categories of content--among them journalistic, medical, educ...

Safeguards and Penalties for Improper Use of Data and U.S. Law

to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...

Administrator Dilemma

university policy that clearly states personal business is not to be conducted upon school computers. Nick had more than enough r...

System Development Life Cycle: Compare/Contrast

a specific definition and set of goals for the project" (Ntuen, 1991, p. 33). II. SYSTEM DEVELOPMENT LIFE CYCLE MODELS Ever sinc...

High-Tech Crime: How The Criminal Justice System Has Had To Change Its Approach

equipped to penetrate any computer system with the intent to take, destroy or manipulate the information found upon that system; i...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...

Don Tapscott's Promise and Peril in the Age of Networked Intelligence

The 'digital economy' is the focus of this paper consisting of five pages with computer networking's advantages viewed within the ...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...

Proctor and Gamble Communication and Management Issues

its category in Europe for all of 1997, and the company achieved that record in the face of intense competition for the market (Mi...

Word Processors and Marketing Campaign Management

In six pages the fictitious 'Speak Your Mind Version 1.0' product that would allow computers to literally be spoken to by word pro...

Increasing Laptop Sales Overview and Marketing Plan

In five pages this paper examines how laptop computer scales can be increased through marketing techniques and plans with a sample...

Company and Product Review of PowerLeap

In five pages this paper discusses the PowerLeap company and its online computer systems upgrading products as featured on its web...

Twenty First Century Business

In five pages the ways in which a hypothetical small business can grow in the twenty first century are discussed and include exami...

Digital Radio Developments

their shapes and forms, which is why there is more background noise and interference with their transmissions. Two other ...

Analysis of an Advertisement Featured in Time Magazine II

In two pages this paper discusses an IBM notebook computer advertisement featured in a Time Magazine issue in an analysis of the p...

Language Acquisition and the Theories of Noam Chomsky

In five pages the differences between Professor Chomsky's theories on language as compared to their predecessors are examined with...

The History of the Modem

This paper examines the history and evolution of the computer modem. This five page paper has six sources listed in the bibliogr...

Information Security

In six pages this paper discusses computer information safety and the dangers posed by hackers. Seven sources are cited in the b...

The Development and History of Artificial Intelligence

and mathematicians. The conference took place in 1956 at Dartmouth College(Shipley 64). From that point forward the concept of art...