Computer and Technology
A discussion on the emerging world of electronic commerce where security is an ever-important issue both to consumers and business.
We Will Write A Custom Essay Sample On ANY TOPIC SPECIFICALLY
FOR YOU For Only $13.90/page
An examination of the challenges facing the educational world following the trend of globalization and open borders.
This paper examines how accessibility to learning and information has improved over the years.
Reviews the technological & ideological pieces that came together to create what is today called the Internet. Argues that the Internet is here to stay & that it will fundamentally change society.
This paper analyzes the various marketing techniques that the automobile industry uses on the Internet.
This paper discusses technological effects on tourism and destination development.
Contribution of MISs to business operations, decision-making, strategic advantages; case study of Chrysler Corp.
This is case history on Napster, which includes the background, a timeline, the outcome, the public relations aspect, and the conclusion.
This paper examines the influence of e-mail on the way people inhabit places and its affect on the intra-office communication and creation process. A special look is taken at the corporate office where e-mail has become a standard way to communicate. “E-mail has become a big influence on the way people inhabit places. Because of […]
Examines regulatory proposals. Fines, obscenity, sexual messages, protecting children, role of parents and free speech.
A technical study of ACARS – Aircraft Communication Addressing and Reporting System.
This paper compares the special effects of “Star Wars: Episode II Attack of the Clones ” and “Spiderman” both released in summer 2002.
An essay on creating an Internet that is accessible for the disabled populations.
A look at what is considered to be the only viable competition for Microsoft Windows – The Unix Linux operating system.
This paper looks at some of the issues surrounding the use of electronic mail.
A discussion of the benefits gained from improved technology, as well as the problems it creates.
This paper focuses on the place of the electronic contract in modern day law practice.
A paper which introduces Itanium Company’s new software design, a concept called EPIC.
This paper explains how the intellectual property laws are ignored on Napster, Kazaa, Gnutella and other file-sharing networks.
An examination of the options available in the Information Technology (IT) world for network crashes in order to save data.
This paper covers a variety of topics related to learning styles. The author includes auditory, visual and kinesthetic, among others. The author also covers the emergence of online learning. Introduction: What is learning? How Do People Learn? What is a Preferred Learning Style? Visual. Auditory. Kinesthetic. How to Reach Everyone. What Teachers Can Do. What […]
Compares and contrasts the use of formal methods and informal methods within the software process.
An exploration of the influence digital technology has had on the music industry.
Features, advantages & disadvantages of two architectures (complex & reduced instruction set computing) & UNIX operating system. Instructions, decoding, performance, portability and pipelining.
Describes the inner workings of a modern computer, focusing on the microprocessor, or a CPU on a single silicon chip.
Examined in terms of its definition, history, newsgroups, reliability of information, World Wide Web, corp. & govt. use and regulation.
Examines alternative approach to software development, focusing on Rumbaugh Object Modeling Technique. History, concepts, advantages.
This paper is an in-depth examination of how the virtual age has affected the way small businesses are run, especially booksellers.
An in-depth discussion of Internet crimes, how the criminals access the victims information and what can be done for personal protection on the Internet.
A comparison of different operating systems used in Microsoft Windows.
This paper describes the use of the Java programming language in middleware component development.
This is a critique of the article “Technology: The Battle for Broadband” by Neil Munro and Teri Rucker, National Journal, 2001.
A paper which looks at the seven layers which make up the OSI Reference model which has described the rules and procedures as to how applications running upon network devices may communicate with each other.
An in-depth study of the Digital Millennium Copyright Act (DMCA)of 1998.
Biographical sketch of the life and contributions of Herman Hollerith, one of the early founders of the modern computer. Hollerith invented the Hollerith Electric Tabulating System which was used for the 1890 census.
A look at the concept of network protocols with definitions and examples of how this allows computers to “talk” to each other.
A paper which discusses why minors should be protected from the evils circulating on the Net.