Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support

Search Essays:   

The Internet

.... The internet provides a cheap, convienient, and quick source of it communication. Ways to communicate on the internet include "Telnet sites," which lets users chat with other internet users. Since there are a large variety of users from around the world, these sites allow one to learn about people and different cultures from around the world. .....

[ Download This Essay Now ] Number of words: 250 | Number of pages: 1

The Anti-Trust Case Against Microsoft

.... Doing this stalled the investigations even more, until finally in August of 1993, (Check 1)the Federal Trade Commission decided to hand the case over to the Department of Justice. The Department of Justice moved quickly, with Anne K. Bingaman, head of the Antitrust Division of the DOJ, leading the way.(Check 1) The case was finally ended on July 15, 1994, with Microsoft signing a consent settlement.(Check 1) The settlement focused on Microsoft’s selling practices with computer manufacturers. Up until n .....

[ Download This Essay Now ] Number of words: 2588 | Number of pages: 10

Technological Development And The Third World

.... of development proceeded to eventually cause widespread environmental damage and it's effect on the local people. . DEVELOPMENT: "WESTERN" STYLE When I refer to "the environment", I mean not only the habitat that humans, plants and animals inhabit, but also the physical, emotional and psychological attitudes that are encompassed by these in their daily existence. Development, by my definition, will consequently refer to the technological advancement of a community as well as the improved statu .....

[ Download This Essay Now ] Number of words: 1573 | Number of pages: 6

The Evolution Of Apple - January 1976 To May 1995

.... or graphics. They call it the Apple I. They form the Apple Computer Company on April Fool’s Day and sold the Apple I board for $666.66 at the Home brew Computer Club in Palo Alto, California. In 1977 the Apple II is available to the general public. Fully assembled and pretested, it includes 4K of standard memory, and comes equipped with two game paddles and a demo cassette. The price is $1,298. Customers use their own TV set as a monitor and store programs on audio cassette recorders. Compare this pr .....

[ Download This Essay Now ] Number of words: 1362 | Number of pages: 5

Classification Analysis

.... the computer itself is basically useless. Another form of output, which is rarely noticed by many computer users however, is the printer. Many people have probably used a printer before, but it is just that they never realize it is also a form of output. As opposed to 'output', 'input' consists of components that take in information from the users themselves so that the computer will know the tasks it is supposed to perform and accomplish. The keyboard is classified as a form of input becaus .....

[ Download This Essay Now ] Number of words: 576 | Number of pages: 3

The Recent Negative Effect Of Technology On Society

.... many people from the suburbs and farms into the city. We can now have forms of electricity directed into our houses for heating and light. Humans are more reliant on technology then ever before. All of these technological advances sound great, however, there is a negative effect to all this technology. Technology can serve to actually harm humans rather then help them. Competition between companies or even cities can sometimes make lives for humans even worse. Take for example when a c .....

[ Download This Essay Now ] Number of words: 1750 | Number of pages: 7

Computer Crime In The 90's

.... they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing" , I have a hard time believing that so lets see what a "hacker" has to say about what he does "Just as they were enth .....

[ Download This Essay Now ] Number of words: 1554 | Number of pages: 6

History Of The Computer Industry In America

.... (Soma, 14). The next innovation in computers took place in 1694 when Blaise Pascal invented the first "digital calculating machine". It could only add numbers and they had to be entered by turning dials. It was designed to help Pascal's father who was a tax collector (Soma, 32). In the early 1800Os, a mathematics professor named Charles Babbage designed an automatic calculation machine. It was steam powered and could store up to 1000 50-digit numbers. Built in to his machine were operations that in .....

[ Download This Essay Now ] Number of words: 2449 | Number of pages: 9

The Computer Underground.

.... organizations, as well as some of the processes by which it came into being. What the CU is has been addressed by the media, criminologists, secuity firms, and the CU themselves, they all have a different understanding or levels of comprehention, this paper attempts to show the differences between the views as well as attempt to correct misunderstandings that may have been propagated by misinformed sources. The differences between the parties of the CU such as, "hackers," "crackers," "phreaks," "pirat .....

[ Download This Essay Now ] Number of words: 4265 | Number of pages: 16

A Computerized World

.... simulate reality on a monitor. In order to feel this so-called reality you have to wear special electronic glasses and an electronic suit. Fastened to the suit are sensors, which send information to the main computer. This computer works with the data and displays them on the electronic spectacles. This is a technique which use three-dimentional views, therefore the scenery seems incredibly realistic. If you want to be a boxer, simply change the scenery on the main computer, and you are in the ring. Tod .....

[ Download This Essay Now ] Number of words: 586 | Number of pages: 3

Laws Must Be Passed To Address The Increase In The Number And Types Of Computer Crimes

.... adventuresome, and willing to accept technical challenges."(Shannon, 16:2) "It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from 'normal' individuals, but that is not the case."(Sharp, 18:3) It is believed that the computer criminal "often marches to the same drum as the potential victim but follows and unanticipated path."(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from .....

[ Download This Essay Now ] Number of words: 1345 | Number of pages: 5

Netspeak: An Analysis Of Internet Jargon

.... is currently spoken by people on the Internet, and is rapidly spilling over into advertising and business. The words "online," "network," and "surf the net" are occuring more and more frequently in our newspapers and on television. If you're like most Americans, you're feeling bombarded by Netspeak. Television advertisers, newspapers, and international businesses have jumped on the "Information Superhighway" bandwagon, making the Net more accessible to large numbers of not-entirely- technically-oriente .....

[ Download This Essay Now ] Number of words: 1719 | Number of pages: 7

Computer Security

.... disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for classmates who lab .....

[ Download This Essay Now ] Number of words: 2493 | Number of pages: 10

Computer Simulation

.... and their battle staffs from battalion through theater-level as well as to support training events in educational institutions. Designed and built using modern computer technology, modern software engineering techniques, and validated algorithms and databases, it will allow units world-wide to train using their organizational equipment. A key feature of the system will be its use of technology to minimize the total Army's overhead associated with supporting training. The system will be desig .....

[ Download This Essay Now ] Number of words: 1706 | Number of pages: 7

Computer Security

.... hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for c .....

[ Download This Essay Now ] Number of words: 2026 | Number of pages: 8

« prev  3  4  5  6  7  next »


 Copyright © 2003 Essay Galaxy.com. All rights reserved