SEARCH RESULTS

YOU WERE LOOKING FOR :The Histroy of Modern Computers

Essays 1 - 30

Computers and Their Early History

In five pages the computer's early history is discussed. Five sources are cited in the bibliography....

Modern Instructional Strategies and Computer Technology

In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on...

Military Advancements and Its Social Organization Effects on the Middle East

This paper consists of five pages and discusses the Middle East of the pre modern, early modern, and modern eras in a consideratio...

Consideration of Computer Technology

In a paper consisting of four pages the origins of modern computer technology, the abacus, are considered as their evolution progr...

The Transformation of Cairo into its Modern Counterpart

20 pages and 10 sources. This paper provides an overview of modern Cairo, a city that is completely modern in so many ways, but h...

Modern Life Run by Technology and Computers

about half of all Americans, according to one source, have Internet access (Roberts, 2005). But still, the number of people buying...

HOLES IN MODERN PORTFOLIO THEORY

In his 1952 article, in which he used the mathematics of diversification, he pointed out, through a variety of formulas, that inve...

Factors in Nursing Philosophy Development

an ED, in general, nursing interaction focuses on individuals, as the point of the emergency service is to stabilize patients in ...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

A Look at the Subprime Market

higher and profits are lower that there is such an interest in this market. Over the years, as business grows, there needs to be...

The Creation of Modern Georgia

to the ideals of the founders. "With London abounding in poverty-stricken citizens, the philanthropic trustees set as their goal t...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Paul Johnson's Modern Times

created the modern political zealot--and his crimes--so the evaporation of religious faith among the educated left a vacuum in the...

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

Love in a Small Town by Wang Anyi

sees the cultural upheavals which have befallen the mainland in its over forty years under socialism as a backdrop, not a major pl...

Contemporary World Economy and The Communist Manifesto of Karl Marx

In two pages this paper applies Marx's ideal government to the modern government system that is powered by an international econom...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Why Study Computer Crime?

damage caused by incidence of computer crime. This includes virus attacks, spam, worms, denial of service (DOS) attacks or other ...

Taylor and Rawls/Premodern to Modern

a hierarchy in the cosmos."iii This hierarchy, which is typically referred to as the Great Chain of Being, was "gradually taken ov...

Rise of Modern Art

(Modern Art Movements, 2008). Impressionist painters, such as Manet, Claude Monet and Edgar Degas, preferred to paint outside, w...