SEARCH RESULTS

YOU WERE LOOKING FOR :Crime of Computer Hacking

Essays 721 - 750

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Comparative Analysis of Biological and Computer Viruses

viruses have the potential to completely wipe out a computer system. Computer viruses have not, of course been photographed or dr...

Computer Industry Contributions of Seymour Cray

In eight pages supercomputer 'father' Seymour Cray is discusses in an examination of his computer industry contributions. Seven s...

The Development and History of Artificial Intelligence

and mathematicians. The conference took place in 1956 at Dartmouth College(Shipley 64). From that point forward the concept of art...

Can Computers Lie?

The Human Brain Descartes argued that the mind is an entirely separate substance from the body because he can "think" of...

Medicine and Computers

In fifteen pages this research paper considers the medical profession's applications of computers in terms of history and various ...

Digital Video or Versatile Disks vs. Compact Discs

Computer enhanced digital techology is the focus of this paper consisting of four pages in which DVDs and CDs are contrasted and c...

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

Twenty First Century US Army

In eight pages this essay examines the application of computer technology to the twenty first century American Army. Five sources...

Protocols of the Current and Next Generation

In ten pages computer networking is examined in terms of an overview of current and next generation protocols and a comparative ev...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

Channels of Direct and Indirect PC Marketing

In a report consisting of fifteen pages this paper evaluates the pros and cons of the direct and indirect channels of marketing em...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...

Methods of Computer Storage

This paper consists of fifteen pages and examines the latest technology involving methods of computer storage with solid state sto...

Place, Space, an the 'Infobahn' in City of Bits by William J. Mitchell

A book report on City of Bits by William J. Mitchell consists of five pages and considers the pervasive social and individual infl...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Saudi Arabia Software CDs and Music Marketing

In ten pages this paper examines the prospect of conducting limited business in Saudi Arabia in this case study of Soft Sound, a c...

Cross Curriculum Pros and Cons of Computer Usage

In fifteen pages this paper discusses elementary education and the uses of computers in a consideration of pros and cons. Twenty ...

History and Future of Computer Networking

In eight pages the history of computer networking is discussed along with the importance of operating system choice, policy establ...

Firefighting Assistance from Computers

to accurately predict the conditions in which the fire would burn out (Walton, 1985). This revolutionary computer "expert syste...

Women and Computers

This paper consisting of six pages discusses Grace Murray Hopper, Ada Byron Lovelace, and other women pioneers in a history of the...

Individual Privacy and Computers

for consumption by the government, organizations, companies and a whole host of other mediums where computers are utilized to tran...

Ethics of Global Computer Laws

Extending that metaphor one step further, Katsch (1995) comments that the invasion of legal spaces by cyberspace, however, goes be...

Computer Domains, Software, and Selection Critera

Computer domains are the subject of this paper consisting of two pages along with the various types of equipment required in order...

Book Review of M. Keller's Rude Awakening

In five pages this book review considers how lack of employee training was the result of computer technology implementation at the...

Business Computer System Design

one must first determine the level of human interaction -- as well as the level of competency -- that will exist at each individua...

E-mail's Influence on Corporate Management Practices

A paper discussing the impact and influence e-mail has had on the corporate landscape. The author discusses the impact of other c...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...