SEARCH RESULTS

YOU WERE LOOKING FOR :Societal and Workplace Impact of Computers

Essays 1621 - 1650

Why In House Training is Important Because of the Shortage of Skilled White Collar Workers

In a paper consisting of six pages the shortage of white collar professionals in an ever changing workplace is examined and conten...

Installing Either Linux, Windows 2000, or Windows ME on a New Notebook Computer

In three pages this paper supports installing Windows 2000 as an operating system for a new notebook computer. Five sources are c...

Early Childhood Classrooms and Computers

In ten pages early childhood classrooms are examined in an assessment of whether or not computers belong in this academic setting....

Laws Regarding Employment Discrimination and Protection

may become involved in dispute resolution. The Equal Employment Opportunity Commission may choose not to file a lawsuit, which th...

Patriarchal Workplace and Women

jobs that are typically occupied by all females verses those that are occupied by all males. These differences can be up to fifty...

Apple Computers and the Information Age

the information revolution is not able to contribute to the development of democratic systems, even though it clearly can offer th...

Attack Vulnerabilities in Controlled Populations and Crime Victims

be. In 1964, the landmark case of Cooper v. Pate served to secure prisoners civil rights with the Supreme Court ruled that they "...

Information Access and Computer Science

In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into ...

Test of Intelligence by Alan Turing

The beliefs of Rene Descartes and other humanist philosophers are considered within the context of Turing's argument that a comput...

Issues of Privacy, Workers, and the Internet

monitored if they arent doing their jobs properly, or are using Internet resources for things other than work-related tasks. Downl...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

United Kingdom Workforce Diversity Management

own racial, cultural, generational and socioeconomic circles. How to manage these factors has become a topic of management courses...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Handling Stress and Ted Pollock's 'Mind Your Own Business'

solution to time pressures, but much of this is because the article is written in an upbeat style, flows well for rapid absorption...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Purpose of the Occupational Safety and Health Act

for example, in order for work to cease on the construction site until the problem is fixed. Clearly, it behooves the foreman to ...

Research Proposal on the Deterrent of Capital Punishment

example, a parent might threaten to spank a child and the fear of the spanking would have a deterrent effect. Thus, the child woul...

Marxist Perspective on Workplace Conflict

middle class can now drive BMWs through inexpensive leasing options, but the divide is still there. The middle class and lower cla...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Boeing Company and Theories of Ethics

2004). John Stuart Mills, in his book Utilitarianism, further stated that not all forms of pleasure were of equal value (Free-Defi...

Research Results of Workplace Ergonomic Design

furniture as well as the environmental setting. The aim is to relieve the physical stress on the body, creating settings that will...

Business Communications and the Importance of Writing

for creation of the perfect document 2) Good writing is the project of rewriting 3) Bad writing leads to hostility and confu...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Case Study of China's STS Manufacturing

produced relaxed a great deal. The move toward a "market economy" from one that has been state-run has been slow, however ...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...