SEARCH RESULTS

YOU WERE LOOKING FOR :Five Articles on Various Issues Involving Computer Technology

Essays 181 - 210

Cockroach Eulogy

In five pages this lighthearted sample of creative writing involving a student's dorm roommate, a beloved pet cockroach....

Low and High Involvement and the Process of Making Purchase Decisions

In five pages this paper discusses the process of decision making when it involves making a purchase with low and high involvement...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Future Role of IT and Telecommunication Companies

In twenty pages this paper discusses the connection between information technology and telecommunications companies in a considera...

Case Study on Flight Time

not developed a business plan. Indeed, the first time that this appears to occur is when an accountant is brought in to make the p...

Banking Industry and Electronic Security

type of cryptography (2000). The Mississippi Secretary of States office for instance describes a digital signature as "a computer-...

A Nursing Perspective on Patient Mental Illness

This 15 page paper discusses seven patients who suffer from various forms of mental illness, and argues that there may be an under...

Major Issues in Societal 'Telematics'

years, some so drastically that they have since been obliged to replace many of those workers who were "downsized." Though driven...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Women Who Seek Technology Careers and Their Characteristics

In a paper consisting of fifteen pages the environment and various issues that relate to women who pursue careers in technology ar...

Insurance and Bank Mergers and IT Issues

justice and respect that must be taken into consideration. Any merger between organizations but especially between banks and the i...

Six Questions on Economics Answered

the way no enforceable rights will lead to opportunism. Coases theorem states that property rights give the market stability by al...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

'Strategic Intent' and Company Operations

relentlessly targeted Southwest in demarketing efforts, Southwest not only continued to exist. Eventually, it surpassed all of th...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

Nursing: Article Reviews

some determining the study was inconclusive, others saying certain interventions should be made universal and still others stating...

Work and Life Boundaries

ignore the home phone if he knows his boss wants him to come in early. This individual may be more stressed due to the fact that h...

Bray's So How Did I Get Here

international view has never been quite so harsh. It seems that America has a peculiar form of racism that continues to exist, but...

Business and the Use of Technology

learn lessons from the construction trade where building can either develop or may be designed especially with the users in mind. ...

IT and Systems Management

in mind when it comes to designing and implementing a system, as opposed to not doing so. While this might be a simplistic stateme...

Organization That Contracts Services to Hospitals

This paper reports a number of issues in which the organization is involved. Issues include: measurements for performance and how ...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Ethics and medical technologies

are a number of research initiatives which deal with genetic mapping, therapy, and modification. Gene mapping, which is fundamenta...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Elementary Classroom's Technology Integration

understand that computer education and training should be a part of every schools curriculum. Added to that, is the fact that chil...

Roger Daniels' 'Rise of Anti Immigrant Sentiment' Reviewed

laws for Congress to pass including barring immigrants from holding major office, forbidding paupers, criminals and mentally distu...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...