SEARCH RESULTS

YOU WERE LOOKING FOR :Computer

Essays 61 - 90

Need a Brand New Custom Essay Now?  click here
Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Employers Monitoring Computer Use

There is no single comprehensive law that covers employee privacy rights or what types of privacy an employee should expect. Due t...

Computer History and Their Impact on Society

This research paper offers a comprehensive overview of the development of computers. Then, the writer discusses the impact that co...

The Impact of the Internet on Communication - Collective Work and Journalism

This paper is written in two parts. The first part of the paper assessed the way that the internet has facilitated collective wor...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

OVERCOMING BARRIERS TO CLASSROOM TECHNOLOGY IMPLEMENTATION

Discusses potential barriers to classroom technology implementation, and was to overcome those issues. There are 4 sources listed ...

Computer Networking and How It Evolved

was to become the Internet, or World Wide Web, progressed during the late 1970s, the need arose to establish a standardized protoc...

Twenty First Century Outlook for the Personal Computer Industry

In a paper consisting of seven pages computer pricing and its industry implications are discussed with the end of 100 percent grow...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

Computers: The Battlegrounds of the Future

and other highly specialized tasks. Information technology and the computers and global network that bind all three together, in ...

COMPUTER MOTHER BOARD

typically include functional units of a computer including the central processing unit, microprocessor, memory, the basic input/ou...

Article Summaries on Topics of Computer Viruses, CPUs and Speed, and the Internet

than normal, unexplainable file size changes, program-operating problems, difficulties in booting the system, and bizarre graphics...

Uses of Computer Protocols

In eight pages computer protocols are examined in terms of their data transfer and communication uses with types such as IPX, PPP,...

Overview of Dell Computer Corporation

In eight pages the computer industry with emphasis upon Dell Computer Corporation is the focus of this examination that includes s...

Computer Environment and Making Smart Networking Choices

For example, a peer-to-peer network might be right for some firms but not for others. Such a network allows all workstations and t...

What Would the World Be Like Without Computers?

in short, without computers. The face of the city might look much the same on the surface, but on close inspection the changes wo...

Computer Forensics: A Rapidly Growing Discipline

of computer forensics technology). Whereas "computer evidence" used to refer to ordinary print-outs, now it includes not only the ...

SHERMAN COMPUTER REPAIR: A NEW ORGANIZATIONAL DIRECTION

a self-analysis to understand what it will need to do to move from computer services into computer building. New technologies will...

CALTRON COMPUTERS AND REVENUE RECOGNITION

months. Elegant paid Caltron $20,000 at the time of shipment, which took place November 15, 20X1. This "down payment" will be appl...

Speech Recognition as a Tool for Human and Computer Interaction

were made in the 1950s, in fact. Bell Labs, for example, developed the capability within the telephone industry to recognize spok...

The Importance of Computers in the Food and Beverage Industry

numbers, or planning, computers can assist management in a variety of things. Not only is management provided with advantages with...

COMPUTERS, INPUT AND OUTPUT DEVICES

other end of the spectrum is the graphics tablet, an input device, complete with stylus, that allows the mover to move the cursor,...