SEARCH RESULTS

YOU WERE LOOKING FOR :Computers and Social Problems

Essays 1 - 30

Social Problems, Social Conflict and “Humanistic Theories

This paper examines social problems' causes and effects from a theoretical perspective in five pages....

Computer System Project

This 10 page paper looks at the way a project to install a computer system in a shop may be planned. The paper focuses ion the pla...

Computer Aided Graphic Design

foci) is constant. The parabola is a set of points in a plane that are equal distances from a given line (the directrix) and a gi...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Teen Pregnancy Problems and Issues

from underprivileged backgrounds. C.) Teenagers can not resist natural urges. D.) Teenagers...

China and the Possibility of Revolution

societal dictates under which Chinese women had lived for centuries. This period was characterized by a complex interaction betwe...

Poverty and the Typification of Poverty in the U.S.

the NASW website discusses poverty and argues that it is about "much more than money alone" (Poverty, 2009). Poverty is the result...

The Typification of Social Problems

(Bartusch, 1996). These labels are mostly employed to the powerless, disadvantaged, and poor, in part because the background goes ...

Computers and Their Early History

In five pages the computer's early history is discussed. Five sources are cited in the bibliography....

Afghanistan National Development Strategy (ANDS)

Security; Governance Rule of Law & Human Rights; Infrastructure & Natural Resources; Education; Health; Agriculture & Rural Develo...

Computers and Social Problems

In five pages this report examines the social problems associated with computers and increased technology in the twenty first ce...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Costs and Benefits of Computer Mediated Communication

There have been some expected benefits that have also proven to be false expectations. It was expected that computer based communi...

Issues of Human and Computer Interface

In twelve pages this paper considers human and computer interface in a discussion of cognitive problems that have yet to be addres...

Apple Computer's Leadership Problems

the negative performance he put forth in 2002 (Salkever, 2004). This was a bad year economically for all. It was shortly after th...

Shyness And Social Anxiety Disorder

contract, not smiling at appropriate times (Bressert, 2006). The incidence of shyness is much less than that of social phobia bu...

Social Problems of Homosexual Behavior

Because societal expectations are formed to a large degree on religions, society has historically shunned any behavior that is not...

Administrator Dilemma

university policy that clearly states personal business is not to be conducted upon school computers. Nick had more than enough r...

Case Study of Commodore International

that could be attached to the customers TV set. It was controlled by a keyboard or it could be controlled by an infrared remote de...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

E-Mail Security on Laptops

e-mail. However in a wireless environment there are other challenges, such as the collection of the e-mail in the first pl...

Social Work Supervision

the intricacies of the situation to take a higher-level view and make higher-level decisions. Relevance of Culture and Diversity i...

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...