SEARCH RESULTS

YOU WERE LOOKING FOR :Youthful Computer Hackers

Essays 241 - 270

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

Twenty First Century US Army

In eight pages this essay examines the application of computer technology to the twenty first century American Army. Five sources...

Protocols of the Current and Next Generation

In ten pages computer networking is examined in terms of an overview of current and next generation protocols and a comparative ev...

Animation Generated by Computers

was a Hollywood breakthrough because all visuals were completed through computer animation. "Toy Story" has had the effect of act...

Educational Project on Computers as Learning Tools

rotating basis. Percentage of participation All students will be able to participate in the project, in relationship to the numbe...

Copyright Violations and Business Ethics with Issues of Computer Software and NAPSTER

In five pages reproducing unauthorized computer software and digital music are featured in this examination of business ethics wit...

Typography and Computer Effects

such significant changes, it is important to first understand this transformation as it relates to graphic design. Two- and three...

Function and Form as They Involve Graphic User Interface

In six pages computer systems are considered in a discussion of graphic user interface function and form. Four sources are cited ...

Comparing Computers by Gateway and Dell

In five pages choices for a personal home computer purchase are discussed in a comparative analysis of two major manufacturers. T...

Computers and Typography

In five pages this paper examines how computers have influenced the art of typology. Two sources are listed in the bibliography....

Societal Impact of Technology

the combination of industrial productivity and high mass-consumption principles. The crisis of Fordism was essentially a crisis of...

Commercial Environment and Computer System Implementation

In eight pages a case study is used to discuss the problems involved in the development and implementation of a business computer ...

Computers and Social Problems

In five pages this report examines the social problems associated with computers and increased technology in the twenty first ce...

Company Profile of Dell

In nine pages Dell is examined in a company profile that includes discussion of the computer industry and its micro and macro leve...

Problem Definition and Solutions

In five pages this paper defines a Y2K computer bug and then considers some possible strategic development solutions. Three sourc...

Computers in the Reading Classroom

In a paper consisting of five pages the ways in which computers can assist children in developing reading skills are discussed in ...

Overview of Generation N"e"XT

Net-savvy that instead of a generation gap, theres a "generation lap" in which older generations feel threatened by the N-Gens fac...

Preschoolers and Educational Software

In five pages preschool and children of early elementary school age are the focus of this consideration of early educational compu...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Computer Testing Model Format Variations

In twenty pages this paper evaluates the program design of computer testing models and provides a testing and instructional design...

Computing Job Consideration

In a paper that contains three pages the importance of work experience, the necessity to make proper module choices and what emplo...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...

Possible Futures For The Microsoft Corporation

antagonize the government. Gates attitude appears to be one of the principal factors behind why the ruling went against Microsoft....

Computer Networking as a Career

In a paper consisting of 5 pages relevant issues to the choice of computer networking will be discussed and include career path pe...