SEARCH RESULTS

YOU WERE LOOKING FOR :Methods of Computer Storage

Essays 31 - 60

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Assessing Usability

for example is something that refers to the use of technology to help the group, something that is done with the use of network or...

Dell Inc.

country (Dell Annual Report, 2000). This company has achieved some amazing results, by 2000 the company was selling $50 million a ...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Prehistorica Computers and Case Study Analysis on eBusiness

programmers may have to work and maintain the site on an ongoing basis. It will likely mean buying new hardware and dedicating a s...

Recruitment in the Airline Industry

need to have a great deal of specific knowledge (Bureau of Labor Statistics, 2007). Some pilots are recruited from the military fo...

Interdisciplinary Perspective on Philosophy

In five pages this research essay examines how the disciplines of computer science, scientific method, psychology, sociology, art,...

Computers and Buddhism

In eight pages computers and their increasing role in Buddhism adherents' lives are examined in the expanded methods of worship, s...

DELL INC. AND DISTRIBUTION IN CHINA

statements. Furthermore, Chinese competitors of Dell have somewhat of a singular advantage, that being backing from the Ch...

Various Educational Approaches

such activities interactive reading, writing and arithmetic is one particular reason why education from computer programs in grade...

4 Methodologies for Information Systems Development

In nine pages information systems development is examined in a consideration of four methodologies including Information Systems w...

Case Study on Decision Making

the different aspects will be considered, rather than a single item gaining a disproportional relevance. Question 2 After readi...

Why Study Computer Crime?

damage caused by incidence of computer crime. This includes virus attacks, spam, worms, denial of service (DOS) attacks or other ...

Weight Training/Advanced Methods

muscle group," as this challenges "local muscle endurance" ("Advanced ...Techniques"). Performing super sets also keeps a workout ...

A Study Using the Scientific Method

In order to test this hypothesis, the research team established four 50x50 cm quadrants, with 50 cm between them. Each of these qu...

Proactive Approaches to Street Racing and Underage Drinking

is bothersome to the point of creating fear and ask for their help in reaching a resolution. From this interactive encounter, the...

Blair Water Purifiers in India- A Qualitative and Quantitative Case Study

as inductive reasoning. The strength of the quantitative approach is in its reliability or the repeatability of the pattern. The...

Scientific Method Philosophy

in earlier times it was regarded only as the poor relation of quantitative research that nearly always was less reliable and far l...

Methods for Data Evaluation

This 30 page paper examines different methods of data evaluation that researchers have available to them. The writer considers tri...

Evaluation Theory in Academia

This 25 page paper discusses the field of evaluation with regard to academic programs. The paper includes a literature review of p...

The Commonalities and Differences in Research using Focus Groups and Group Interviews

The writer looks at two methods of gathering data for qualitative research; group interviews and the use of focus groups. Each met...