SEARCH RESULTS

YOU WERE LOOKING FOR :Organizational Issues and Computer Programming

Essays 271 - 300

Evolution of Computer Technology

In four pages computer evolution is traced from the 500 B.C. abacus to contemporary desktop computers. Four sources are cited in ...

Medical Technology and Computers

In seven pages medicine and its computer history are considered with such concepts as telemedicine, computer aided surgery, and 'v...

Apple Computer's Changing Fortunes

In ten pages the ongoing saga of Apple Computer's management shortcomings is presented. Ten sources are cited in the bibliography...

Overview of Computer Security

In ten pages this research paper focuses on computer security and its breaches with statistics covering its type, incidences, and ...

Graphic Design and Color

production of light by some source; the modification of this light by the illuminated object; the optics and physiology of the eye...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

Libraries and Censorship Filters

content specifically set out in the CIPA statue;... 2. Certain broad categories of content--among them journalistic, medical, educ...

American Leadership as Personified by Steve Jobs and Virginia Henderson

CP/M, which was shortly to be succeeded by MS/DOS (Alsop 188). The Macintosh operating system offered an icon-driven system that a...

Key Concepts of Organizational Design

2008, p. 143). Innovation has the opportunity to flow freely, though accountability can be more difficult than within more define...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Introduction to Psychobiology

the brain waves. Electrodes are places on the scalp and a machine picks up the shape and types of waves, e.g., alpha waves or beta...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Article Summaries on Topics of Computer Viruses, CPUs and Speed, and the Internet

than normal, unexplainable file size changes, program-operating problems, difficulties in booting the system, and bizarre graphics...

Assessing Usability

for example is something that refers to the use of technology to help the group, something that is done with the use of network or...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

Frantek Case Study

Frantek. The way that revenue is recognized in a relativity simply concept and is found in FASB Statement of Financial Accountin...

Operations Problems at Riordan Manufacturing

immediate vicinity of the goods Riordan is receiving. There are several problems with this arrangement, not the least of wh...

Outlining a House of Lords' Appeal

In six pages a case that failed to launch a successful appeal, the 1987 Chapman & Another v CPS Computer Group PLC case, is ar...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

Copyright Violations and Business Ethics with Issues of Computer Software and NAPSTER

In five pages reproducing unauthorized computer software and digital music are featured in this examination of business ethics wit...

Enforceability and Binding 'Clickthrough' Ecommerce Agreements

In thirty pages this paper discusses electronic commerce transactions in an overview of such topics as electronic signatures, clic...

Computer Industry and Politics

In five pages this paper discusses the issues involving politics and the ever changing technology of the computer industry. Seven...

Do Computers Have Creative Ability? An Artificial Intelligence Consideration

on the scene. Certainly the case is silly, but once, we thought computers were frivolous as well. Since we have come to...

Computer Networking as a Career

In a paper consisting of 5 pages relevant issues to the choice of computer networking will be discussed and include career path pe...

Morocco's CasaComputer Marketing

In twenty seven pages this paper presents a plan for Morocco marketing of computers that are made in the United States in a consid...