Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 121 - 130 of 4442 matching essays
< Previous Pages: 8 9 10 11 12 13 14 15 16 17 Next >

121: Exploring The Career Of A Comp
Exploring the Career of A Computer Programmer I. Job Description A. Role of Computer Programmer B. Nature of Work II. Educational Preparation A. High School B. Postsecondary Education III. Potential Earnings A. Lowest Paid B. Average ( Median ) C. Highest Paid IV. Possible Benefits A. Discounts B. Use of Company ... A. Eye Strain B. Back Discomfort C. Carpal Tunnel Syndrome The rapid spread of computers in today s society has bought forth the demand for more people to build, write programs for, and repair computers. Computer engineers do the building while computer analysts do the repairs, but the ones that write the programs for these machines are computer programmers. Computer programmers write, code, test, and debug detailed instructions for the ...
122: Polymorphic & Cloning Computer Viruses
Polymorphic & Cloning Computer Viruses The generation of today is growing up in a fast-growing, high-tech world which allows us to do the impossibilities of yesterday. With the help of modern telecommunications and the rapid growth of the personal computer in the average household we are able to talk to and share information with people from all sides of the globe. However, this vast amount of information transport has opened the doors for the computer "virus" of the future to flourish. As time passes on, so-called "viruses" are becoming more and more adaptive and dangerous. No longer are viruses merely a rarity among computer users and no longer ...
123: Studying in The Computer Science Field
Studying in The Computer Science Field Computer Science is the study of computer's and their interaction with the web and programs. In Computer Science one can learn how to make web pages, design software, and make programs. In this day and age everyone needs to have ...
124: Computer Mouse
The computer mouse is an input device that uses a graphical user interface. Computers that incorporate the graphical user interface into their system are able to use the computer mouse to maneuver around the computers different applications. The mouse is used in many different applications including engineering and computer games. When using the computer mouse with the graphical user interface you move the mouse along a flat level surface. The arrow on the computer monitor will move with the movements created by the ...
125: The Year 2000 Bug
Do you have a home computer or a small business with a computer? You have undoubtedly read or heard information about the upcoming new century and are wondering if you need to do something to help your PC make the transition into the year 2000. This site is constructed to help you answer that question, and to help you sort fact from fiction. The way that your computer system will be affected by the year 2000 will depend not only on the equipment and software that you have, but on the way you use your PC and rely on it. If you ...
126: Artificial Intelligence
... in both speech recognition and handwriting recognition are likely ready for mass integration into financial institutions. RESEARCH PROJECT TABLE OF CONTENTS Introduction 1 Purpose 1 Source of Information 1 Overview 2 The First Steps 3 Computer-Synthesized Senses 4 Visual Recognition 4 Current Research 5 Computer-Aided Voice Recognition 6 Current Applications 7 Optical Character Recognition 8 Conclusion 9 Recommendations 10 Bibiography 11 INTRODUCTION Purpose The purpose of this study is to determine additional areas where artificial intelligence technology may be ... then" rules. The problem with this approach is that people don't always know why they do what they do. And even when they can express this knowledge, it is not easily translated into usable computer code. Also, expert systems are usually bound by a rigid set of inflexible rules which do not change with experience gained by trail and error. In contrast, neural networks are designed around the structure ...
127: Careers In Computer Engineering
Careers In Computer Engineering While financial analysts, government officials, and employment specialists frequently disagree on conditions existing in the American economy today, everyone concurs with the idea that a college graduates possessing a degree in the field of computer engineering is in the enviable position of being able to pick and choose among job offers with several major computer companies and other Fortune 500 employers. Over the last five years, demand for computer engineers has grown due to the rapid growth and advances in the computer industry. Computers are everywhere, and they are ...
128: On Line Schemes
On line Schemes Cyberspace was once a place inhabited largely by government agencies and academics linked together through a decentralized collection of computer networks that came to be known as the "Internet." The late 1980s and early 1990s gave birth to a torrent of commercial entrants into cyberspace, with the way led by Compuserve and then Prodigy and ... taken for a ride on the cyberspace. State securities regulators around the U.S. are concerned about the explosion of illicit investment schemes now flourishing on commercial bulletin board services and the informal web of computer networks that make up the Internet. An estimated four million U.S. households that already have access to the major online services are being exposed to hundreds of fraudulent and abusive investment schemes, including stock manipulations, pyramid scams and Ponzi schemes.5 The online frontiers are aware of some of the major rip-off techniques now in use. According to Fighting Computer Crime, the investment fraud problem could reach epidemic levels over the next few years as several million unsophisticated newcomers crowd onto the once lightly traveled information superhighway.6 On the other hand, cyberspace can ...
129: Software Piracy
... worldwide market is today supplied by developers in the United States, significant development work is occurring in scores of nations around the world. But in both the United States and abroad, unauthorized copying of personal computer software is a serious problem. On average, for every authorized copy of personal computer software in use, at least one unauthorized copy is made. Unauthorized copying is known as software piracy, and in 1994 it cost the software industry in excess of US$15 billion. Piracy is widely practiced ... to be in excess of 99%. Why do People Use Pirated Software? A major reason for the use of pirated software is the prices of the REAL thing. Just walk into a CompUSA, Electronics Boutique, Computer City, Egghead, etc and you will notice the expensive price tags on copies of the most commonly used programs and the hottest games. Take the recent Midwest Micro holiday catalogue for example and notice ...
130: Animation
... to write this essay, pertaining to animation. Since I was a child I have been fascinated with cartoons; from when they started out to be black and white, and until now with full colour and computer effects. To better perceive what my personal feelings about animation are, I must first discuss in full detail, a general overview of how animators bring traditional animation alive with motion. Animation seems like a smooth ... print involves merging the sound and picture on one piece of 24 frames per second film, the film is now ready for projection! The above described how traditional animation is created. But now with the computer becoming more useful and more tangible in its usefulness in everyday society, animation is going through a dramatic change, with newer and easier alternatives in creating and editing animations, on work stations and home computers ... like Disney and Silicon Graphics are stepping up to a higher and more advanced level of animation, by using computers to create animation effects that traditional animation techniques would never be able to create. Special computer effects that were created on computers were observed in the movies "Abyss", "Terminator 2", and "Jurassic Park". All these movies had some computerized animation added to the film producing special effects never seen previously ...


Search results 121 - 130 of 4442 matching essays
< Previous Pages: 8 9 10 11 12 13 14 15 16 17 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved