SEARCH RESULTS

YOU WERE LOOKING FOR :Issues of Human and Computer Interface

Essays 151 - 180

Twenty First Century Outlook for the Personal Computer Industry

In a paper consisting of seven pages computer pricing and its industry implications are discussed with the end of 100 percent grow...

Computer's Components and Operations

what to do and what function to perform. An example of software would be Windows 98. A good way to understand what Windows 98 is ...

Safeguards and Penalties for Improper Use of Data and U.S. Law

to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...

Computer Hardware and Peripherals: The Evolution of Learning

use computers in our daily lives for both work and for play many of us are not as well educated in these machines as we maybe ough...

Profiles IBM Apple Dell

This essay provides a brief history and recent performance of IBM, Dell, and Apple Computer. The paper begins with a discussion of...

Computer History and Their Impact on Society

This research paper offers a comprehensive overview of the development of computers. Then, the writer discusses the impact that co...

E-Marketing Strategies for a Computer Company

benefit of Prehistoric Computers. Having said that however, the one big disadvantage is that the information supplied by t...

Ideal Computer Building

which has been chosen is one that is well ventilated and also has an integral fan and power supply. The provision of a fire wall U...

Agricultural Businesses and Using Computers

Just, 2001). The impact can however be minor in respect to large farms that already have access to a great deal of information in...

The Roles of the Computer and E-Commerce in a Video Store

Dictionary (2000), as "Commerce that is transacted electronically, as over the Internet". This indicates that e-commerce is much w...

The Technological Evolution of Computers

term was used broadly to reference any machine which handled data (even manual calculators and the like) (New York Public Library,...

Protection and Data Risk

exploitation of any potential vulnerabilities that have been discovered in stage 1, the actual hacking, either to gain the inform...

Case Issue Pertaining to Workplace Diversity

real struggle in terms of learning this technology and probably figures that he has gone this far in his career without having to ...

Basic Human Rights Undermined by the Human Rights Act of 1998's Margin of Appreciation

may be seen as conflicting. However, the effectiveness of the Act given by the margin of appreciation may be argued to undermine t...

Issues Involving Computer Viruses

In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered...

Prehistorica Computers and Case Study Analysis on eBusiness

programmers may have to work and maintain the site on an ongoing basis. It will likely mean buying new hardware and dedicating a s...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Internet, Computers, and Global Issues

to create problems, while others are out to do damage (Adams, 2000). There is in fact a debate on the ethics of hacking as there a...

Human Needs, Human Resources, and Human Resource Management

to Kramer (1997), the current trend within the fundamental basis of business operations is to establish a sense of empowerment, bo...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Article Summaries on Topics of Computer Viruses, CPUs and Speed, and the Internet

than normal, unexplainable file size changes, program-operating problems, difficulties in booting the system, and bizarre graphics...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Human Resource Problems at One Company

contributions. Sales were declining and the company changed its approach to offset this event. The company adopted teams for the...

Prospective Students and University Interfacing

technologies is at the heart of educational changes at the university level in recent years and is based on the focus towards emer...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Organizational Issues and Computer Programming

Greco (1998), in discussing this topic, explains that the new loyalty is one where the individual is loyal to himself as opposed t...

Ethical Issues and Computers

workings of a computer hold as much interest for hackers as the workings of a 57 Chevy do for the car fanatic. This interest is ...

Apple Computer Supply Chain Issues

one or more software packages for purchasers. Apple offers online sales, but most of Apples products are sold through retailers. ...