SEARCH RESULTS

YOU WERE LOOKING FOR :computer technology

Essays 451 - 480

Need a Brand New Custom Essay Now?  click here
Computers in the Classroom

In twelve pages elementary classrooms are considered in terms of computer usefulness with the writer discussing necessary technolo...

Elementary Education and Computers

In five pages elementary education is considered within the context of computers in the classrooms with test score improvements am...

Computers and Their Impact Upon Students with Extreme Behavior Disorder

In five pages this proposed model tests computer effects upon students with EBD with methodology and anticipated results included....

Analysis of an Advertisement Featured in Time Magazine II

In two pages this paper discusses an IBM notebook computer advertisement featured in a Time Magazine issue in an analysis of the p...

Language Acquisition and the Theories of Noam Chomsky

In five pages the differences between Professor Chomsky's theories on language as compared to their predecessors are examined with...

Learning Theories Applied to Computer Education

This paper addresses the learning theories of constructivism and mastery learning. The author tests these theories by applying th...

Germany and the Marketing of Computer Hardware

third largest, and accounts for somewhat more than one-fourth of the European Unions GDP. According to BusinessEurope (1998), amon...

Digital Radio Developments

their shapes and forms, which is why there is more background noise and interference with their transmissions. Two other ...

Medicine and Computers

In fifteen pages this research paper considers the medical profession's applications of computers in terms of history and various ...

Protocols of the Current and Next Generation

In ten pages computer networking is examined in terms of an overview of current and next generation protocols and a comparative ev...

Digital Video or Versatile Disks vs. Compact Discs

Computer enhanced digital techology is the focus of this paper consisting of four pages in which DVDs and CDs are contrasted and c...

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Comparative Analysis of Biological and Computer Viruses

viruses have the potential to completely wipe out a computer system. Computer viruses have not, of course been photographed or dr...

The History of the Modem

This paper examines the history and evolution of the computer modem. This five page paper has six sources listed in the bibliogr...

Information Security

In six pages this paper discusses computer information safety and the dangers posed by hackers. Seven sources are cited in the b...

Computer Industry Contributions of Seymour Cray

In eight pages supercomputer 'father' Seymour Cray is discusses in an examination of his computer industry contributions. Seven s...

The Development and History of Artificial Intelligence

and mathematicians. The conference took place in 1956 at Dartmouth College(Shipley 64). From that point forward the concept of art...

Can Computers Lie?

The Human Brain Descartes argued that the mind is an entirely separate substance from the body because he can "think" of...

Computer Network Security: Security Devices

visited the most" (Surfing the Internet on-board the Web, 1995). Having this information allows these companies to create a target...

Why Linux is Better Than Windows

additional cost of hundreds of dollars. Linux is an open source file, which means it is completely free for downloading on its we...

Employment Law and Employer Duties; A Case Study

is also an obligation on the employer to ensure that there are adequate welfare facilities arrangements, which may help counteract...

Considerations When Carrying Out Market Research

purchase from the firm in the last twelve months, alternatively the definition may be the last six months1. The way that t...

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

The Use of Computers in Online Education

may decide to spend some years traveling in their twenties and work late into their seventies or eighties. Conversely, they may de...

General Insurance Company Case Study

This 11 page paper looks at a case study supplied by the student, describing the current manual information systems that are in pl...

Production of a Single Commodity

catches on, can make or break a technology company in a short amount of time" (Value chains, 2006). Companies that are going to ke...

Business Plan for ABC Books

computers at a minimal cost, but as much as possible, keep them similar for the sake of simplicity. Additionally, when purchasing ...

Computer Comparison and Evaluation Memo

operating system is important as well, but that can be changed and all of the evaluated computers include Microsoft Windows(r) XP ...

Notebook Computers

for mobile use and efficient power consumption" (Laptop, 2006). They usually have liquid crystal displays, a built-in keyboard, an...