SEARCH RESULTS

YOU WERE LOOKING FOR :Overview of Computer Security

Essays 1441 - 1470

Computers and the Y2K New Millennium Bug

This paper examines the many computer problems that can result from the Y2K bug upon the year 2000 in five pages. Three sources a...

Year 2000 Computer Crisis

mayhem in the world. Most computer programs have a two-digit date field, thus when the year 1998 is keyed in, the computer reads o...

Y2K, the Year 2000, and Thereafter

Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...

Role of Management in Avoiding Y2K Catastrophe

In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...

Computers in the Future and the Internet

In seven pages this paper considers Ralph M. Stair and George Walter Reynolds' text Principles of Information Systems - A Manageri...

Proposal for a Small Business Management Information System

In fifteen pages this paper examines how a small business can create a management information system to meet its need in a proposa...

Societal and Workplace Impact of Computers

COBOL, PL1, RAMIS, FORTRAN and many others. While some languages have survived the PC revolution, many languages have become obsol...

Information Systems and Computer Management Planning Issues

This paper consists of five pages and examines management of computer or information systems management and the management issues ...

The Significance of Computer-Aided System Engineering Tools

The writer describes the use of computer-aided system engineering (CASE) tools and their significance for business. The writer arg...

LAN Computer Network Construction

In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniq...

Importance of Literacy in the Workplace

more and more apart. In the 1990s, one fact that has become painfully apparent is the role of literacy in dividing society into a ...

Distributed Computer Databases

In nine pages this research paper examines distributed computer databases in terms of their history, how they are applied, design ...

Don Tapscott's Promise and Peril in the Age of Networked Intelligence

The 'digital economy' is the focus of this paper consisting of five pages with computer networking's advantages viewed within the ...

Computer Automation in the Workplace II

In nine pages this paper discusses office automation in the form of computers in the workplace. Nine sources are cited in the bib...

Business World, Computability, and Machine Languages

the work, or the game, or the information beyond the commands and the toolbars. He or she knows the limits of what the computer c...

Home Businesses and Computer Generated Changes

In a paper consisting of five pages home businesses are examined in terms of the changes brought about by computers. Eight source...

Global Impact of Computers

parts of the world. In Japan the realities that involve the computer and the participation in such is called maruchmedia, or mu...

A Feasibility Study of Marketing Economics in Spain

This paper examines marketing concepts pertinent to a multinational computer company entering into business in Spain. This ten pa...

Computer Manufacturing and Job Costing

* There are assembly costs to combine the chips and wafers and put them on the motherboard. This costs $10 per hour and requires 5...

Human Learning and Computer Technology

heavy reading and/or composition requirements. When third grade students are able to apply the touch-type method of keyboarding, ...

3 Education Research Proposals

policies, implementation and use may occur, impacting different stakeholders. 2. Methodology To assess the way popular media a...

How Computers Weaken Language Skills

a poem as well as a human being, the real problem is not skill, but in ideology. That is, many people tend to rely on computers an...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

Acer

notebooks and net books, specifically the Aspire, with Acer selling 9.67 million units in the third quarter of 2008 alone, this wa...

SIGGCHI (Web Site Analysis)

computers, the name of the group might be confusing. The following explanation appears as to why the group is in existence: SIGGCH...

Ethics Awareness Inventory

also something that is easily masked. Bad people can appear good and vice versa. Making a determination about an individuals tru...

The Importance of Computers in the Food and Beverage Industry

numbers, or planning, computers can assist management in a variety of things. Not only is management provided with advantages with...

Therac-25: A Socio-Technical System

this safety net should have been provisions that insured the computer would detect when a high-powered electron beam was chosen by...

Assessing Usability

for example is something that refers to the use of technology to help the group, something that is done with the use of network or...