SEARCH RESULTS

YOU WERE LOOKING FOR :Using Computer Networks and Security Issues

Essays 601 - 630

Computers and the Use of Natural Language Processing

In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and pro...

City Baseball Stadium Use and Risk Management

In five pages this paper discusses municipal base ball stadium uses in this risk management consideration that includes informatio...

Systems' Downtime and Business Solutions

In a paper consisting of eight pages solutions to downtime in business are considered in terms of intangible and tangible costs as...

Film, Photography, and Computer Generated Animation

In five pages the uses of animation that is generated by computers in terms of human motion visualization and greater understandin...

Solutions to System Security Issues

data to a controlled group. One can easily discern the difference by recognizing the fact that Internet-based applications make u...

Modern Instructional Strategies and Computer Technology

In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on...

Toddlers and Computers

In 5 pages this paper discusses toddlers in preschool and computer uses. There are 4 sources cited in the bibliography....

Computer Advantages and Disadvantages

In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources ...

Copyright Violations and Business Ethics with Issues of Computer Software and NAPSTER

In five pages reproducing unauthorized computer software and digital music are featured in this examination of business ethics wit...

Security, Accounting, and Information Systems

In five pages this tutorial answers questions regarding IS uses in security and auditing areas. Two sources are listed in the bib...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Kuwait's National Security Issues

Government does challenge the border on occasion ("Kuwait," 2003). Iraq had been a threat long after the Gulf War. Yet, although ...

Security in Schools and Technology

in schools can solve all problems, but that it can be used to benefit schools if used properly: "National School Safety and Securi...

Organizational Issues and Computer Programming

Greco (1998), in discussing this topic, explains that the new loyalty is one where the individual is loyal to himself as opposed t...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...