essays & term papers     

KEYWORDS : 

Search for free essays, research papers & book reports.

Acceptance Essays
Accounting
Advertising
African-American Studies
Aging
Agricultural Studies
American History
Anthropology
Archaeology
Architecture
Arts
Asian Studies
Astronomy
Authors
Aviation and Aeronautics
Biographies
Biology
Book Reports
Business
Chemistry
Child and Youth Issues
Communication
Creative Writing
Criminology
Dance
Drama and Theater
East European Studies
Economics
Education
Engineering
Environmental Studies
Ethics
Ethnic Studies
European History
Experiments
Finance
Gender and Sexuality
Geography
Geology and Geophysics
History
Holocaust Studies
Hot Topics
International Relations
Labor Studies
Language
Latin-American Studies
Law
Linguistics
Literature
Mathematics
Medical and Health
Miscellaneous
Movies
Music
Mythology and Folklore
Native-American Studies
Novels
Nutrition
People
Personal
Philosophy
Physics
Plays
Poetry
Politics
Psychology
Public Administration
Religion
Science
Shakespeare
Short Stories
Social Issues
Sociology
Speeches
Sports
TV
Technology
Tourism
Women Studies
                Sign In


Forgot Password / Customer Support

  

53 Computer S Essays, Term Papers and Book Reports


A Survey of Manufacturing and Computer Systems As Expressed by Small Firms in Missouri
A Survey of Manufacturing and Computer Systems Needs As Expressed by Small Firms in Missouri A Research Proposal By William H. McKnight Jr. For Dr. Bruce D. Dallman In Partial Fulfillment of Research in Technology SOT 709 April....

Admission Essay for Information Technology
Have you ever had a time in your life when you see something and you become totally fascinated about it? A feeling so strong, so powerful, that no matter what you’re doing, this just keeps popping into your mind, and that just makes you more curious about it? That was the feeling that took over me ....

Advertising Plan for Webster University Thailand
Advertising Plan for Webster University Thailand. I. Introduction. II. Company’s Profile. III. Sitution Analysis a. Strength b. Weakness c. Opportunities d. Threats IV. Key Planning Decisions. a. Advertising Objectives. b. Target Audiences. c. Competitive Advantage. d. Image, Personal....

Become Well rounded by learning Microsoft products.
There are literally hundreds of desirable traits in the workplace. Of these, one of the arguably most important is to be well rounded in the workplace. Many skills can assist an individual in being a well-rounded employee. Oral communication skills, written communication skills, teamwork, technical ....

Business Plan for Boxes for Less
Executive Summary There is a growing trend towards sustainability in Canada. Vancouver is one location where consumers are looking for products that are ¡§eco-friendly¡¨. Corrugated cardboard is an environmentally-friendly form of packaging material because about 79% of waste generated is rec....

Career in Computer Science and Programming
In the year 1995, our family received their first ever computer. It was a Pentium I with a 75 MHz processor, 64 MB ram, a 16x CD-Rom, a 5-gigabyte hard drive, and Windows 95 operating system. I thought it was the coolest thing man has come to know. It had games, and a completely new world called the....

Change Management at Crys Tel
Change Management Crys Tel, a leading United States based telecommunications company which produces data cables, wireless solutions and network development, plans to implement a range of emerging technologies, which will increase the company’s product offerings (University of Phoenix, 2004). To....

Coke
OVERVIEW : The Coca-Cola Company engages in the manufacture, distribution, and marketing of nonalcoholic beverage concentrates and syrups worldwide. The company offers nonalcoholic beverages, principally carbonated soft drinks, as well as noncarbonated beverages. Its beverage products comprise b....

Computer games
Introduction Computer games in the information systems industry account for over seven billion dollars in sales in 2003 and are a pivotal component in driving both the software and hardware portions of the industry. (Entertainment Software Association, 2003). Computer games are quickly taking a....

computer science - as a major
Computer Science - as a major Career planning involves relating what you know about yourself .selecting a major has been the most difficult challenge I have faced while at high school, playing cricket for the high school team, nor making friends. It is difficult to comprehend that selecting a major....

Computer Security
About two hundred years before, the word "computer" started to appear in the dictionary. Some people even didn't know what is a computer. However, most of the people today not just knowing what is a computer, but understand how to use a computer. Therefore, computer become more and more popular....

Contract Risk and Opportunities
A contract is an arrangement that is adhered to by a court of law or parity. According to the Restatement (Second) of Contracts, a contract is an undertaking or set of agreements for the infringement of which the law gives a solution or the presentation of which the law somehow becomes familiar with....

CrysTel Communications - Change Management Research
Running head: CHANGE MANAGEMENT Change Management Research University of Phoenix Change Management Research CrysTel Communications is currently facing many difficult and challenging decisions with selecting the correct model of chang....

Data Compression
"Data Compression" just sounds complicated. Don't be afraid, compression is our good friend for many reasons. It saves hard drive space. It makes data files to handle. It also cuts those immense file download times from the Internet. Wouldn�t it be nice if we could compress al....

Designing secure systems
Designing Secure Systems Designing secure systems became very important topic in our time of IT world. Unauthorized use of the data in the system results in material loss, which can be substantial especially for the larger corporations. The security of information is crucial to the employees, cu....

Economic Consequences of Piracy
In 1996 worldwide illegal copying of domestic and international software cost $15.2 billion to the software industry, with a loss of $5.1 billion in the North America alone. Some sources put the total up-to-date losses, due to software crime, as high as $4.7 trillion. On the next page is a regional ....

Economic Consequences of Software Crime
In 1996 worldwide illegal copying of domestic and international software cost $15.2 billion to the software industry, with a loss of $5.1 billion in the North America alone. Some sources put the total up-to-date losses, due to software crime, as high as $4.7 trillion. On the next page is a regiona....

Essay on The F.B.I.
To uphold the law through the investigation of violations of federal criminal law; to protect the U.S. from foreign intelligence and terrorist activities; to provide leadership and law enforcement assistance to federal, state, local, and international agencies; and to perform these responsibilit....

Ethics in Information Technology
Introduction Computer professionals require more than an ethic to ‘obey the law'. (Olzak 2007) states: ‘Unlike legal issues where something is either legal or illegal, ethics is about doing the right thing regardless of the existence of laws, policies, or rules.’ Any role carries with it 're....

Fiscal Policy
Fiscal Policy Measures are the tools used by the Government to keep the economy moving toward its long-run potential output or income. Policies implemented by the Federal Government are essential in the economies Real Gross Domestic Product (GDP) and aggregate income of the economy. Some Federal G....

For some people math is the supreme form of all knowledge. Is this view reasonable or does it involves a misunderstanding of math
Especially in today’s world we depend on math in our everyday life more than ever before. Everyone uses computer technology as well as simpler devices like a toaster. These electronic devices are developed, produced and work following the existing mathematical knowledge which explains us the world ....

Forensic Accounting
Introduction When you think of the term forensics, what comes to mind? For the younger readers CSI probably rings a bell, while the elder crowd would probably think of Quincy. Both TV shows glorified the acts of forensics in a medical sense. But a lesser-known form of forensics has been growing....

Global Communication Gap Analysis
According to Wall Street the telecommunications industry has been less than satisfying and stockholders are losing faith in the industries ability to bounce back. Global Communication is among those that have taken a hit due to increased competition and plummeting stocks. It is important for a co....

Government Censorship
Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas onthe Internet; therefore, government should not encourage censorship. Introduction I. In the Internet community, there is a large volume of technical terms. For this reason, it is firstnecessary to examine the....

Hard Drives
Hard drives have been around longer than you think. In 1956, I. B. M. had invented a disk storage unit that was very large but did not store a lot of data. It was twenty-four inches in diameter and could hold only five megabytes, which is the equivalent to three and one half floppy disks. Origina....

Hewlett-Packard--Computer Systems Organization: Selling to Enterprise Customers
In this case, Hewlett Packard has too many sales and marketing divisions which hinders proper communication between departments and creates distinct cultures in each department instead of having a singular organization-wide culture. Hewlett Packard has two distinct cultures, one focused on achievin....

How many animals are used in research?
How Many Animals Are Used in Research? It's impossible to know exactly how many animals are being used in research because U.S. laws do not require scientists to report how many mice, rats, or birds they use. But even though no one is sure how many rats and mice are used in research, most sources a....

Interclean
Problem Solution: InterClean, Inc. Interclean has been a leader in the industrial cleaning and sanitation industry. They have recently acquired Envirotech with the vision of creating a new market in providing a complete solution to the customer. This change and acquisition has created some communi....

ISDN VS. Cable Modem
1.0 IntroductionThe Internet is a network of networks that interconnects computers aroundthe world, supporting both business and residential users. In 1994, amultimedia Internet application known as the World Wide Web becamepopular. The higher bandwidth needs of this application have highlightedth....

Kudler Fine Foods Operations Management
Introduction Kudler Fine Foods is a specialty store that carries domestic and imported goods like fresh baked goods, fresh produces, fresh meat and seafood, cheeses and a nice selection of wine. Currently the locations for the three stores are La Jolla, Del Mar and Encinitas (Apollo Group Inc., 200....

Kudler Fine Foods- Overview of Management
Kathy Kudler had a vision where a person would not have to travel all over town to gather ingredients for a wonderful meal. With that vision Kudler decided to open Kudler Fine Foods that would stock a wide selection of the freshest ingredients as well as the tools a gourmet chef could ever need (Apo....

Leadership and Organizational Changes
Leadership and Organizational Changes December 18, 2006 MBA/520 Transformational Leadership Introduction CrysTel is taking the necessary steps necessary in the advancement of its organization by adding new technological products to its company. In order f....

Loose Technology
What is a hacker one may ask? He doesn't wear a stocking mask over his face, nor does he break a window to get into your house. He doesn't hold a gun to your head, nor does he go through your personal possessions. Considering the situation, he recognized just the way a thief is recognized. But one ....

Macroeconomic Impact on Business Operations
Monetary policy plays an important role in today’s economy. The role of monetary policy is to strike a balance among the key macroeconomic variables in the changing times of today. The importance of this paper is to learn how monetary policy affects our money supply and what tools the Federal Reser....

Macroeconomics Impact on Business Operations
Macroeconomics surveys trends in the national economy as a whole considering the study of the sum of individual economic factors. In addition, economic systems are subjective to several macroeconomic factors. A nation will strive for sustainable economic growth to improve the standard of living fo....

management functions
Throughout the years, the role of a manager has changed. Years ago, managers were thought of as people who were "the boss." While that might still be true today, many managers view themselves as leaders rather than as people who tell subordinates what to do. The role of a manager is comprehensive an....

Managing Across the Organization
In today’s highly competitive business world, companies face new challenges everyday. Good Sport is not the first company to have to change their strategy to adapt to their ever-changing industry. Upon researching the issues Good Sport faces, it is not uncommon for companies to experience conflict ....

Object-Oriented Database Management Systems
The construction of Object-Oriented Database Management Systems started in the middle 80's, at a prototype building level, and at the beginning of the 90's the first commercial systems appeared. The interest for the development of such systems stems from the need to cover the modeling deficiencies ....

OPERATIONAL MANAGEMENT
Running head: OPERATIONAL MANAGEMENT Operational Management University of Phoenix Operations Management at Kudler Fine Foods Kudler Fine Foods is an upscale specialty store, with three locations in the San Diego, California metropolitan area. Kathy Kud....

Organization Management Kudler Fine Foods
Running head: Organizational Behavior Assignment Organizational Behavior Assignment University of Phoenix MBA 502 May 6, 2007 Kudler Fine Foods is a gourmet grocery store that has experienced significant growth and constantly focuses on expanding its services, improvi....

Organizational Behavior paper - Kudler
Kudler Fine Foods Organizational Behavior MBA 502 – Managing the Business Enterprise Alex Alexandrou November 5th, 2007 . Introduction All companies continuously change and evolve over time. This assignment analyzes Kudler Fine Foods pro activity or strugg....

Privacy in the Information Age
This is the Information Age, otherwise known as the age of gathering information. People are introduced to all types of information from print and broadcast media, and they themselves are the object of information collected on an increasing scale. Computers have be come so well established in peopl....

Retail Marketing Plan
MISSION : To be the best provider of ICT and ICT-enabled education in Asia VISION : We are an educational institution committed to develop individuals to become valuable and productive contributors to society through innovative ICT and ICT-enabled learning and career planning systems. We striv....

Robert Morris and the first Internet Worm
Robert Morris first encountered a computer at his home. Morris’ father, the chief scientist of the Computer Security branch of the National Security Agency, once brought home one of the original Enigma cryptographic machines from the NSA. As a teenager Morris had an account on the Bell Labs’ compu....

Significant Others
In my life there aren’t many significant others. I think I have pretty much eliminated everyone whose evaluations of me really mattered from my life. I don’t know if you can call that cognitive conservatism. Cognitive conservatism is the tendency to seek information that co....

Software Licensing, an Intellectual Property
Intellectual property rights (IPR) are components of the foundation of software industries. IPR refers to, "a collection of intangible rights of ownership in an asset such as a software program" (Freibrun, 2009, ¶ 2). Each intellectual property "right" is an asset in itself. The law provides differ....

Stained Glass: Stephen Glass
"Thou shalt not lie." The Ten Commandments states it clearly and simply. Nonetheless, lying happens constantly and embodies various forms. There are exaggerations, little white lies, lies told to avoid punishment, lies spoken to get ahead in the workforce, and many other types of lies. Some simp....

Storage Devices and How They Affect Computer Speed
Storage Devices and How They Affect the Speed of A Computer Today’s computers have various ways to store data. Some such devices are hard disk, floppy disk, RAM, CD ROM, and USB Memory Stick. Some of these devices store data internally and some store data externally. The speed in which a com....

Teaching Computer Science: The Showdown
Ryan Rawlinson Laura Boerker English 1301/30013 September 15, 2007 Teaching Computer Science: The Showdown Many professors and job interviewers have their own take on a computer science degree and what it means. Computer Science is the science that deals with the theory and methods of processi....

Teaching Study Assignment
Introduction The Royal Automobile Club (RAC) have identified a impending problem in the diagnosis of vehicle faults at the roadside with modern motor vehicles. Motor manufacturers are producing increasingly sophisticated engine management technology to comply with stringent vehicle emission con....

Voice recognition and speech synthesis technologies
By Nick Hampshire. ZDNet UK (June 12, 2006). "Voice recognition and speech synthesis technologies may not have developed to the degree some science fiction writers hoped, but have nevertheless seen some startling successes. ... Voice synthesis has been around for a long time. Bell Labs demonstrated ....

WHY I CHOOSE THE CAREER THAT I HAVE CHOSEN
My personal goals in life have always been centred around one major factor – the desire to help others and expose them to new ideals; generally to impact their lives and make them better persons on a whole: thus the reason I chose psychology as my major. I intend to pursue this career to the doctor....

Wireless Technology
AbstractWireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two gener....




PRIVACY |  TERMS & CONDITIONS |  MEMBER LOGIN |  CUSTOMER SUPPORT
© 2004-2024 Free Essays LLC - Free Essays, Term Papers and Book Reports