Make
Your Selection Below:
Papers On Computers & The Internet
Page 38 of 168
|
|
Computer Training in the Workplace
[ send me this paper ]
A 3 page paper which illustrates the importance and challenge of computer training in the workplace. Bibliography lists 3 sources.
Filename: RAputer4.rtf
Computer Use in Agriculturally Oriented Businesses
[ send me this paper ]
This 4 page paper examines a small farm and a nursery business. Owners are interviewed and research done to discern the differences and similarities between the two types in respect to computer use. Bibliography lists 2 sources.
Filename: SA348agr.rtf
Computer Utilization in the Railroad Industry
[ send me this paper ]
This 7 page paper examines the inclusion of computer related products into the railroad industry. Specific programs are discussed as is the importance of GPS. Bibliography lists 10 sources.
Filename: SA540tek.rtf
Computer Viruses
[ send me this paper ]
The path of technology has confronted and overcome
each new problem that has stood in the way of 'progress'. The computer
viruses currently 'attacking' the computer population is no exception.
This 5 page paper defines computer viruses, looks at their effects and
provides a guide to prevention. Bibliography lists 5 sources.
Filename: KTviruss.wps
Computer Viruses
[ send me this paper ]
An 11 page research paper that investigates computer viruses and their ramifications � costs, effects on society, and the future � as well as an examination that takes into consideration Marxist theory. Bibliography lists 10 sources.
Filename: khconvir.wps
Computer Viruses
[ send me this paper ]
21 pages. Privacy on the Internet has become one of the most problematic areas in this age of technology. In fact, because of the constant threat of viruses there is now software for electronic profiling that enables the user to collect intensive information from various sources through aggressive data mining and artificial intelligence techniques. The problem is that while the technology is in place to collect this information on individuals, who is justified in using it, and why? Seemingly any company wishing to do intense data scanning on consumers will be able to justify to their own satisfaction the use of privacy-invading software tactics. The problem here is what constitutes the proper use of data mining and what constitutes hacking? Bibliography lists 18 sources.
Filename: JGAvirus2.tf
Computer-Aided Software Engineering (CASE)
[ send me this paper ]
This 8 page paper provides an overview of CASE. Various aspects are explored. Bibliography lists 7 sources.
Filename: SA214CAS.rtf
Computer-Aided Translation
[ send me this paper ]
A 12 page paper discussing the state of computer aided translation. There have been significant advances in computer aided translation in the last half-century that it has been the focus of study. It still is not possible to use one of the translator tools that exist now to adequately translate conversational language or even Shakespeare, but there are applications that have met with great success. These applications tend to be narrowly defined in terms of linguistics and idiomatic use of language. Technical texts translate better than more creative efforts. Those applications are better left to human translators. Bibliography lists 5 sources.
Filename: KScompTranslate.rtf
Computerising a Company
[ send me this paper ]
This 10 page paper examines some issues that may be encountered when a company, in this case an insurance company, look at computerising the operations. The issues considered includes the many uses of spreadsheets, the social and legal issues of computerising, how using computers may lead to an increased market share and how to protect against viruses. The bibliography cites 3 sources.
Filename: TEcomptr.rtf
Computerising a Hospital
[ send me this paper ]
This 12 page paper considers the computerisation of a hospital. The paper begins with a discussion on the benefits that will be realised as a result of computerisation. The writer then considers the problems and solutions before going on to look at the actual implementation. The bibliography cites 10 sources.
Filename: TEhospit.wps
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
Be
sure to also visit:
Term Paper Help On
File, 12000 Papers,
Research Papers Dot Net,
Essay Site, Paper
Geeks, Paper or Essay
Finder, The Essay Page,
Reports and Papers,
Report Finders, 12000
Papers, Real Papers, E
- Coursework, Choose
a Paper,
Pick a Paper, Paper
Download, & Expert
Term Paper Advice
(Click Here For MORE Term Paper &
Research Paper Help Sites!)
|