Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 141 - 150 of 1468 matching essays
< Previous Pages: 10 11 12 13 14 15 16 17 18 19 Next >

141: Hate Groups and the Internet
Hate Groups and the Internet With the Internet being used by millions of people of all ages worldwide for both, educational and recreational purposes, a great tool has been created for those in our society who wish to project their opinions, good or ... has chosen to take advantage of this tool is the so called "hate groups", organizations which preach the discrimination and hatred of one type of persons or another. The inclusion of these groups on the Internet needs to be looked at carefully and closely, and although it would be impossible to eliminate these sites from the web, measures need to be taken to ensure their influences do not reach the ...
142: The Internet Beneficial Or Fat
The Internet: Beneficial or Lethal Almost everybody today owns a computer, or someone close to them does. Everyone has access to a computer. Of all these personal computers in the world right now, the majority of them are connected to the Internet. There are many different types of sites on the Internet: stores, chat rooms, personal home pages, personal pet pages, news pages, entertainment pages, sports pages, file pages, adult pages, etc. Everything that one could ever ask for is on the Internet, and a lot ...
143: COMPUTER CRIME Hackers And Security Measures
... telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today s technology. The Internet can be used for criminal purposes in different ways: from a simple blackmail to the most perplex crime like money laundering. Technology can be applied as easily by the criminal and terrorist as it can ... by the authorities; and very often the criminal has greater desire to profit from that technology than have the authorities themselves . Furthermore, companies, institutions and private lives, especially in western countries, are prevalent by computers, Internet and other relevant technologies. Business operations without the support of digital technology do not exist. For instance, banks distribute funds through computer networks. Banks and credit card companies are quickly adopting automated payment systems. ...
144: The Communications Decency Act
The Communications Decency Act The U.S. Government should not attempt to place restrictions on the internet. The Internet does not belong to the United States and it is not our responsibility to save the world, so why are we attempting to regulate something that belongs to the world? The Telecommunications Reform Act has done exactly that, put regulations on the Internet. Edward Cavazos quotes William Gibson says, "As described in Neuromancer, Cyberspace was a consensual hallucination that felt and looked like a physical space but actually was a computer-generated construct representing abstract data." (1) ...
145: Internet Censorship Laws
Internet Censorship Laws Internet and the kind of information it gives an access to became a very hot topic over the past couple of years. All we hear these days is government trying to pass some kind of new ... the law known as the Communication Decency Act. Luckily for us, that law was found illegal later by the Supreme Court and taken down. The law was severely limiting our freedom of speech on the Internet. The reason for the most of the laws of that kind is the pornography on the net. I agree with the people who try to pass those laws in that the child pornography is ...
146: Censorship on the Internet
Censorship on the Internet Five years after the first world wide web was launched at the end of 1991, The Internet has become very popular in the United States. Although President Clinton already signed the 1996 Telecommunication ActI on Thursday Feb 8, 1996, the censorship issue on the net still remains unresolved. In fact, censorship in cyberspace is unconscionable and impossible. Trying to censor the Internet its problematic because the net is an international issue, there is no standard for judging materials, and censorship is an abridgment of democratic spirit. Firstly, censorship on the Internet is an international issue. The ...
147: Computers and Society
... fear of computers and their ability to confuse people. Early exposure to computers will help increase computer use in society years from now. The biggest network of connected computers is broadly referred to as the internet, information superhighway or electronic highway. The internet was started by the Pentagon as a way for the military to exchange information through computers using modems. Over the years the internet has evolved into a public resource containing limitless amounts of information. The main parts of the internet are FTP (file transfer protocol), gopher, telnet, IRC (internet relay chat), and the world wide web. FTP ...
148: Porn on the Internet
Porn on the Internet Many mothers do not want their children to experience drugs, violence, illness, or sex. In our society where these are readily available, mothers need to be especially cautious of what their children encounter. Another reason ... or mistakenly connecting to them. This is why mothers should act immediately if they do not want their children to be exposed to demeaning pictures of complete nudity and explicit sex. They need to monitor Internet use for their children by purchasing and installing a program that filters out pornography. Surprisingly, there is an unlimited amount of pornography on the Internet. Search engines that most kids use for gathering information for school projects are the tools that anyone can use to connect to the pornography sites. Some search engines that teachers recommend to studnts are ...
149: Computer Crime
... In every neighborhood there are criminals, so you could say that hackers are the criminals of the computers around us. There has been a great increase in the number of computer break-ins since the Internet became popular. How serious is hacking? In 1989, the Computer Emergency Response Team, a organization that monitors computer security issues in North America said that they had 132 cases involving computer break-ins. In 1994 ... years. An example is 31 year old computer expert Kevin Mitnick that was arrested by the FBI for stealing more then $1 million worth in data and about 20,000 credit card numbers through the Internet. In Vancouver, the RCMP have arrested a teenager with breaking into a university computer network. There have been many cases of computer hacking, another one took place here in Toronto, when Adam Shiffman was charged ... with cases popping up each day we see that hardware theft is on the increase. As the network of computers gets bigger so will the number of software thief's. Electronic software theft over the Internet and other online services and cost the US software companies about $2.2 billion a year. The Business Software Alliance shows that number of countries were surveyed in 1994, resulting in piracy estimated for ...
150: Linux Against Microsoft Window
Linux Against Microsoft Windows Linux is a free operating system that was developed on the internet.It was formed by Linus Torvalds first,then he put its source code to his web page.After that,the internet hackers and the programmers developed it.It is a Unix-like operating system because it is the main reason to develop the Linux.By the time,it becomes a big organization and now it is ... of ram(32Mb is recommended).Linux can be used by users that have limited systems.Multi-user capabilities of Linux provides to share one computer s resources by hundreds of people over a network, the internet or on computers and terminals connected the serial port of those computers. By this you can connect your computer or laptop to another computer and you can use it.Multi-user capability of windows ...


Search results 141 - 150 of 1468 matching essays
< Previous Pages: 10 11 12 13 14 15 16 17 18 19 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved