| Title |
Pages / Words |
Save |
| Bill Gates Leader Report |
5 / 1323 |
 |
| Bill Gates |
6 / 1712 |
 |
| Sunil Mittal |
2 / 440 |
 |
| A perfect murder |
2 / 378 |
 |
| Bob's World |
2 / 515 |
 |
| The world is flat |
6 / 1625 |
 |
| AAPL Industry Analysis |
16 / 4769 |
 |
| Analysis Of Library As A Process |
4 / 1017 |
 |
| Andrew Grove |
5 / 1279 |
 |
| Apple Computer – 2005 |
8 / 2349 |
 |
| Apple, Inc. |
7 / 2019 |
 |
| Art of war in the corporate world |
7 / 2080 |
 |
| Being a Business Accountant |
3 / 798 |
 |
| Bill gates and his accomplishments |
5 / 1394 |
 |
| Body Shop International - SWOT Analysis |
2 / 548 |
 |
| Business Continuity Planning and Emergency Management |
2 / 521 |
 |
| CONTRACT LAW |
5 / 1476 |
 |
| Case study- Muscat College |
7 / 1918 |
 |
| Choose A Current International Accounting Standard (Ias) Or International Financial Reporting Standard (Ifrs). Briefly Summarise Its Provisions And Assess Whether The Standard Can Be Considered To Be ‘Principles-Based’ Or ‘Rules-Based’, E... |
4 / 1110 |
 |
| Computer Industry Analysis |
14 / 3973 |
 |
| Cost Improvement by Design Innovation |
1 / 290 |
 |
| Decision Making Model |
4 / 1044 |
 |
| Dell Computers Strategy |
6 / 1618 |
 |
| Dell Swot |
6 / 1757 |
 |
| Dell |
3 / 664 |
 |
| Edger |
2 / 423 |
 |
| Employee Privacy Rights in the Workplace |
5 / 1364 |
 |
| Financial Comparison of Microsoft, Dell, and Apple |
7 / 2084 |
 |
| GEN 105 Recommended Skills |
3 / 648 |
 |
| Harvard case study on Apple |
4 / 1075 |
 |
| Hewlett Packard company info,tagert market and competitors |
7 / 1819 |
 |
| IT Guy |
10 / 2762 |
 |
| Industry Analysis: Apple Computers |
7 / 1928 |
 |
| Intel |
2 / 380 |
 |
| Internal and External Factors of Apple computers |
4 / 1106 |
 |
| International Gray Markets |
3 / 830 |
 |
| International Marketing |
4 / 1103 |
 |
| Internet: A Way to Communicate |
5 / 1249 |
 |
| It Support |
1 / 290 |
 |
| importances of Effective communication |
2 / 346 |
 |
| intro letter |
2 / 382 |
 |
| Marketing Audit Approach |
1 / 286 |
 |
| Marketing Dell |
8 / 2340 |
 |
| Marketing |
1 / 281 |
 |
| Ms |
3 / 705 |
 |
| Office Automation |
4 / 925 |
 |
| Organizational Impact Paper |
4 / 921 |
 |
| organizational trends |
3 / 716 |
 |
| PRODUCTION AND THE WORKFORCE |
3 / 648 |
 |
| practical analysis |
2 / 468 |
 |
| RESPONDING TO THE ENVIRONMENT (Strategies) |
2 / 304 |
 |
| Reframing, Bolman and Deal |
5 / 1459 |
 |
| Regional Article |
3 / 763 |
 |
| Report |
2 / 480 |
 |
| Research On Apple |
4 / 1139 |
 |
| Sega |
2 / 466 |
 |
| Self-Awareness in Cultural Competence |
2 / 472 |
 |
| The Porter Analysis |
12 / 3330 |
 |
| The World is Flat |
3 / 771 |
 |
| Total Quality Management Survey Paper |
6 / 1723 |
 |
| Trade and Prosperity |
9 / 2500 |
 |
| Trends in Organizational Behavior |
3 / 875 |
 |
| Yum Improvement |
2 / 365 |
 |
| Zara |
2 / 571 |
 |
| Claudius and Other Characters of Hamlet |
3 / 620 |
 |
| Iago of Othello |
3 / 695 |
 |
| computer addiction |
2 / 343 |
 |
| Reaction to Transcendentalism |
3 / 723 |
 |
| Sonrisas |
2 / 420 |
 |
| Technology in the internet classroom |
6 / 1616 |
 |
| Technology: The Downturn of Society |
5 / 1299 |
 |
| The Internet: A Clear and Present Danger |
3 / 887 |
 |
| The Matrix: Neo, A Struggle of Identity |
4 / 1030 |
 |
| The Strengths Of Emily Grierson |
2 / 571 |
 |
| To Build a fire |
2 / 569 |
 |
| mac vs ibm |
8 / 2177 |
 |
| safeguarding against computer virus |
4 / 998 |
 |
| Digifast |
2 / 340 |
 |
| Employee Involvement |
4 / 1149 |
 |
| Human Resources |
2 / 332 |
 |
| Inner-City Paint |
2 / 544 |
 |
| Music |
1 / 295 |
 |
| Negative Effects Of Tv For Children |
2 / 316 |
 |
| Trojan War |
2 / 382 |
 |
| African Psychology |
2 / 532 |
 |
| Apple itunes |
2 / 312 |
 |
| Are Blacks Too Cool For The We |
2 / 393 |
 |
| Civilize The Wilderness |
2 / 511 |
 |
| Compare And Contrast The Attit |
2 / 496 |
 |
| Controlling Computers With Neu |
7 / 1841 |
 |
| Cover Letter |
2 / 317 |
 |
| Do Less Blacks Than Their Fell |
2 / 393 |
 |
| Do prisons teach people to become worse criminals? |
5 / 1302 |
 |
| Economic Divergence In Australia |
2 / 522 |
 |
| Estate Description |
2 / 563 |
 |
| External Research |
2 / 507 |
 |
| Generation X |
2 / 311 |
 |
| Generation-x |
2 / 311 |
 |
| Hackers |
6 / 1743 |
 |
| i am the orca |
2 / 472 |
 |
| Julius Caesar - Friendship Theme |
2 / 598 |
 |
| Marathon |
8 / 2306 |
 |
| Mathematicians:Making Numerous Contributions |
6 / 1705 |
 |
| Millennium Bug |
11 / 3085 |
 |
| memory |
3 / 885 |
 |
| Neurocomputers /article Review |
2 / 322 |
 |
| Oil Refinery in India |
6 / 1636 |
 |
| Personal Writing: College |
2 / 507 |
 |
| Portable Mri |
2 / 402 |
 |
| plagiarism |
2 / 423 |
 |
| Rampant Plagiarism |
2 / 363 |
 |
| Rewarding System, |
3 / 660 |
 |
| Skill |
2 / 447 |
 |
| Technology: Radio/television |
2 / 379 |
 |
| The Sea Wolf |
3 / 654 |
 |
| Traveling Alone |
3 / 671 |
 |
| Trojen in KaZaA |
2 / 307 |
 |
| What is a Hacker |
2 / 409 |
 |
| Why Be Adolescent |
3 / 679 |
 |
| With Microsoft and PC's dominating a large majority of the computer market (an estimated 90%), what has allowed Apple/Macintosh to survive and expand as a business? |
5 / 1266 |
 |
| Can the Music Industry Change Its Tune? |
6 / 1692 |
 |
| juy |
1 / 292 |
 |
| "In Expanding The Field Of Knowledge We But Increase The Horizon Of Ignorance" (Henry Miller) Is This True? |
6 / 1541 |
 |
| Can A Computer Have A Mind |
2 / 546 |
 |
| Desicion Making And Problem Solving |
4 / 945 |
 |
| Technology and the Human Condition |
5 / 1480 |
 |
| Transcendentalism in Modern Art |
2 / 527 |
 |
| Why Be Adolescent |
3 / 679 |
 |
| Intelligent Design |
2 / 356 |
 |
| Chemistry- Collision Theory |
4 / 1127 |
 |
| Technology |
5 / 1304 |
 |
| Techonology and People |
1 / 262 |
 |
| Bowling Alone, Chapter 1 |
3 / 612 |
 |
| Changes In The Working Patters In The Modern World |
2 / 333 |
 |
| Childhood Obesity |
4 / 1040 |
 |
| Counterfeiting: An International Issue |
6 / 1678 |
 |
| How Media Affects Elections |
2 / 554 |
 |
| I would be stupid not to |
4 / 993 |
 |
| Media Reaction Paper |
4 / 1017 |
 |
| One Child Policy |
2 / 552 |
 |
| Proud to ba an american |
2 / 405 |
 |
| Racial Profiling |
2 / 472 |
 |
| Strengths and Weaknesses |
3 / 846 |
 |
| To what extent can technology help solve the problem of food shortages in the world? |
3 / 669 |
 |
| Age Of Information Technology |
2 / 414 |
 |
| An Ergonomic Evaluation Of The Kinesis Computer Keyboard |
3 / 784 |
 |
| analysis of technology in movies |
6 / 1518 |
 |
| Basic Concepts of Windows |
6 / 1561 |
 |
| Becoming A Network And Computer System Administrator |
7 / 1941 |
 |
| Bill Gates and His Accomplishments |
5 / 1394 |
 |
| Booting the Computer |
2 / 405 |
 |
| Children Using The Internet |
4 / 1077 |
 |
| Computer Crimes of Today |
5 / 1430 |
 |
| Computer Crimes |
7 / 2005 |
 |
| Computer Information Systems |
2 / 317 |
 |
| Computer Programming: A Brief Overview |
3 / 739 |
 |
| Computer hardware |
3 / 849 |
 |
| Cyber Terrorism |
7 / 1898 |
 |
| Cyberporn: On A Screen Near You |
1 / 297 |
 |
| cybercsirmes |
6 / 1743 |
 |
| Data and its Importance in Accurate and Quick Processing |
4 / 1087 |
 |
| Describe Zara's IT infrastructure. |
2 / 308 |
 |
| Difference Between Logical and Physical Design |
4 / 999 |
 |
| Digital Divide |
5 / 1368 |
 |
| Effects of Technology |
3 / 663 |
 |
| Email Privacy Issues |
2 / 373 |
 |
| Ethical Computer Hacking |
3 / 776 |
 |
| Evolution of Programming Languages |
1 / 277 |
 |
| effects of technology |
2 / 401 |
 |
| Functions of Management |
1 / 268 |
 |
| hardware systems |
4 / 1062 |
 |
| hisoty of the apple computer |
5 / 1371 |
 |
| how ICT is used in the world |
2 / 377 |
 |
| Internet Hacking |
7 / 1924 |
 |
| Internet In The Classroom |
3 / 740 |
 |
| Is Your Information Safe? |
6 / 1526 |
 |
| Kevin Mitnick |
4 / 923 |
 |
| laptops vs. Desktops |
2 / 501 |
 |
| Multiculture Telecommunication In Work Place |
1 / 269 |
 |
| Network Administrator |
7 / 1922 |
 |
| Networking |
3 / 852 |
 |
| Networks Problems |
4 / 1076 |
 |
| Neurocomputers /Article Review |
2 / 322 |
 |
| Nokia corporation |
1 / 294 |
 |
| Reliance |
13 / 3877 |
 |
| Riordan Manufacturing IT upgrade |
7 / 1971 |
 |
| Student |
1 / 268 |
 |
| Technology Paper |
2 / 446 |
 |
| Technology |
2 / 308 |
 |
| The History Of The Internet |
8 / 2366 |
 |
| The use of computers in business |
5 / 1221 |
 |
| Token Ring |
10 / 2994 |
 |
| Unix- Operating Systems |
6 / 1582 |
 |
| Unix |
3 / 698 |
 |
| Video Games: Sport or Not? |
2 / 369 |
 |
| Virtual Private Network |
3 / 872 |
 |
| Viruses, Trojan horses and worms can be the cause of damage to a computer system ? are people who generate them breaking the law? Use examples or case studies from the press or text books to explain your answer |
4 / 1058 |
 |
| Windows Vista |
1 / 283 |
 |
| wireless networking |
5 / 1240 |
 |
| Your Career as an IT Professional |
8 / 2167 |
 |