Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 41 - 50 of 4442 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

41: The Electronic Computer
The Electronic Computer One of the most important themes in the history of civilization is our ever increasing use of tools to shape and control the world around us. These tools range from the simple hammer and saw ... such as the calculator. The other one is for preserving and communicating ideas, such as the technology of writing and printing. In the past ten years, however, a powerful, general-purpose mind tool, the electronic computer, has become widely available. In almost any shopping mall we can now buy a machine that will not only do our arithmetic. In addition, this machine helps us think, write, draw, play music, learn, keep records and retrieve information. It is the electronic computer that we are using every day. The idea of an automatic computing machine can be traced back to the mid-nineteenth century. But it was only in the 1904s, when electronics was applied to ...
42: The Future of Computer Crime in America
The Future of Computer Crime in America Sociology Research Paper Sociology per. #2 Sociology Topics: Future Society Social Change Social and Enviromental Issues Deviant Behavior Crime/Corrections Period: # 2 The proliferation of home computers, and of home computers equipped with modems, has brought about a major transformation in the way American society communicates, interacts, and receives information. All of these ...
43: Computer Crimes
Computer Crimes It's the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy. To ...
44: Computer Security
First, we have to understand these type of computer crimes such as below because they will let us know the computer crimes often happen in our lives. 1. unauthorized use, access, modification, copying, and destruction of software or data (Bill Smith, the computer consultant, was convicted under recently enacted statutes covering this category of crimes); 2. theft of money by altering computer records or theft of computer time; 3. theft or destruction of hardware; 4. use or ...
45: Computer Piracy
Computer Piracy Imagine for a second that you are a softwrare developer creating a new piece of software that you plan to sell to the public so they can use it for individual purposes only. Then you log on to the internet and see that your new creation is being downloaded by hundreds, even thousands of web surfers. Welcome to the illegal world of computer/software piracy. Computer/Software piracy hurts all businesses, consumers, innovation and those who have jobs. Piracy is an $11.4 billion dollar industry. That is 40% worldwide. Piracy is a serious crime and needs to be dealt ...
46: The Internet Its Effects And Its Future
... Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense¡¦s communications systems. Fearing the consequences of nuclear attack, there was no central computer holding vast amounts of data, rather the information was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was developed to allow disparate devices to work together. The original ... video, sound- just about any form of communication, as effortlessly as making a phone call. It is easy to understand why the Internet is rapidly becoming the corporate communications medium. Using the mouse on your computer, the familiar point-and-click functionality gives you access to electronic mail for sending and receiving data, and file transfer for copying files from one computer to another. Telnet services allow you to establish connections with systems on the other side of the world as if they were just next door. This flood of information is a beautiful thing and ...
47: Computer Software Piracy and it's Impact on the International Economy
Computer Software Piracy and it's Impact on the International Economy The PC industry is over twenty years old. In those twenty years, evolving software technology brings us faster, more sophisticated, versatile and easy-to-use products. Business software allows companies to save time, effort and money. Educational computer programs teach basic skills and complicated subjects. Home software now includes a wide variety of programs that enhance the users productivity and creativity. The industry is thriving and users stand to benefit along with the ... states that much of the problem of software theft arises from the way the software industry developed. In the past, when a software firm spent millions of dollars to write a program for a mainframe computer, it knew it would sell a handful of copies. It licensed each copy to protect its ownership rights and control the use of each copy. That is easy to do with only a few ...
48: Hackers Misunderstood
... thrive off curiosity, and have an unsatisfying hunger for knowledge. The word impossible or access denied does not exist in a hacker’s vocabulary. They can access anything and everything that is kept in a computer. Particularly when a price has been placed on knowledge and information. Why should only a select few have leisure of knowing what the rest of the public does not? Knowledge is and should always remain ... hacker’s purpose is to explore foreign material. The most common cliché is “Using your knowledge to increase your knowledge.” But nowhere in the process is it said to gain material wealth or harm other computer systems. Hackers are the ones that should be helped and assisted because of the their sheer intellectual capacity, and their ability to solve the everyday problems of the rapid advancement in modern technology. But is hacking really a crime? Is there a line between harmful and harmless hacking? “Hacking is a state of mind, not just the activity of breaking into computer systems. It can mean sitting up behind a computer all night ...
49: Computer Viruses
Computer Viruses Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), ...
50: Is Your Information Safe?
... Just the same he's a thief. Although this thief is one you'll not only never see, but you may not even realize right away that he's robbed you. The thief is a computer hacker and he "enters" your home via your computer, accessing personal information -- such as credit card numbers -- which he could then use without your knowledge -- at least until you get that next credit card statement. Richard Bernes, supervisor of the FBI's Hi-Tech ... computers and financial networks, and all are linked together via the Internet or other networks. More than a hundred million electronic messages travel through cyberspace every day, and every piece of information stored in a computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank robbers have become today's computer hackers. They can walk away from a computer crime with millions of virtual dollars (in the form ...


Search results 41 - 50 of 4442 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved