Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 21 - 30 of 774 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

21: Click Vs. Brick: An Exploration Of Mp3 File Sharing And Mp3
Click vs. Brick An exploration of mp3 file sharing and online music piracy, and its ethical implications regarding consumers, musicians, and record companies Background “In traditional ethical studies, the classic problem is the starving man – can a starving man ethically steal a loaf of bread if he has ... price is too high?” The topical escalation of media coverage besieging the demise of Napster has instigated widespread debate over the implications file sharing and the Internet will have for the record industry. The Napster software allowed its millions of users to share and download music mp3 files, which are of near CD quality, from each other’s hard drives. This infringed copyright laws and provided a very real threat to ... of a report, the following discussion will evaluate these key points from the perspective of the consumers, musicians, and record companies. The Consumers’ Perspective There are two fundamental arguments that endeavour to justify online music piracy from the consumers’ perspective. The first is that copying is fair use. Many believe that subsequent to buying a recording; consumers should be entitled to do with it as they please. This is a ...
22: Computer Crime
... revolution, and also the newest style of crime, "computer crime". The following information will provide you with evidence that without reasonable doubt, computer crime is on the increase in the following areas: hackers, hardware theft, software piracy and the information highway. This information is gathered from expert sources such as researchers, journalists, and others involved in the field. Computer crimes are often heard a lot about in the news. When you ask ... become a problem in the last few years, with cases popping up each day we see that hardware theft is on the increase. As the network of computers gets bigger so will the number of software thief's. Electronic software theft over the Internet and other online services and cost the US software companies about $2.2 billion a year. The Business Software Alliance shows that number of countries were ...
23: Viruses
... into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy. To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to "Hack" your way into another. They use programs called scanners which randomly dials numbers any generating tones or ... devices than do various things, such as make outgoing calls free, make incoming calls free, simulate coins dropping in a phone, etc. People who "Phreak" are caught alot these days thanks to the new technology. Software Piracy is the most common computer crime, it is the illegal coping of software. "People wouldn't think of shoplifting software from a retail store, but don't think twice about going home and ...
24: Uniform Commercial Code 2b The
A new law will probably be introduced into state legislatures which will govern all contracts for the development, sale, licensing, and support of computer software. This law, which has been in development for about ten years, will be an amendment to the Uniform Commercial Code. The amendment is called Article 2B (Law of Licensing) and is loosely based on UCC ... Uniform State Laws (NCCUSL) and the American Law Institute is drafting the changes to the UCC. The UCC was drafted in the 1950 s and currently governs the sales of goods but not products like software, which are licensed, not sold. Basically, when you purchase software, you are purchasing the information and rights to use the software. Article 2B creates standards for licensing these information products, including rules for interpreting warranties, legal remedies, liability and risk. This project began to ...
25: Computers in the Workplace: Are They Used Ethically?
... s offices look very different from those in the late 1970s. Then typewriters, filing cabinets, and correction fluid were the norm. Today these items have been replaced by microcomputers, database management systems, and word processing software. You are already familiar with some of the benefits of using computers in the workplace-for example, computers make it easier to manage the company database, accounting, and finance-related activities, and communications among different ... or would the employees be too afraid to work creatively? In addition, a growing percentage of the work force is working at home. Workers can communicate with their offices via a microcomputer and special communications software. In many cases, this arrangement enables workers in metropolitan areas to get work don instead of sitting in traffic. However, how does working at home affect employee morale, efficiency, and motivation? How does the employer ... need special translator hardware so they can read text and numbers. Fortunately, many add-on products are available to adapt standard microcomputers to the needs of the disabled, including voice translators for the blind and software that modifies the way the keyboard and the mouse are used. However, products such as these vary in sophistication and are usually quite expensive. As a result, very few companies make these purchases. Aren' ...
26: The Year 2000 Bug
... to help you answer that question, and to help you sort fact from fiction. The way that your computer system will be affected by the year 2000 will depend not only on the equipment and software that you have, but on the way you use your PC and rely on it. If you only use your PC to play games, you probably won't need to be concerned about year 2000 ... managing finances or to store important date-sensitive information, you may want to learn more to determine if your particular system is at risk and what you can do to minimize that risk. Anti-virus software available for 90 day trial - free of charge To assist in helping small/medium businesses and consumers to deploy anti-virus software, Microsoft has teamed with leading anti-virus firms Central Command Inc., Computer Associates International Inc., Data Fellows Corp., Network Associates Inc., Norman ASA, Panda Software, Sophos Inc., Symantec Corp. and Trend Micro Inc., to ...
27: The Bulgarian and Soviet Virus Factories
... to answer the main questions: Who makes viruses there, What viruses are made, and Why this is done. It also underlines the impact of this process on the West, as well as on the national software industry. 1) How the story began ====================== Just three years ago there were no computer viruses in Bulgaria. After all, these were things that can happen only in the capitalist countries. They were first mentioned in ... infect EXE files works this way. Also, the virus does not try to bypass the resident programs that have intercepted INT 13h, therefore it takes the risk to be detected by most virus activities monitoring software. The author of the virus obviously could circumvent it --- for instance it uses a clever technique, now known as "interrupt tracing" to bypass all programs that have hooked INT 21h. The only reason for not ... programs, thus it could cause damage. Of course, the fact that the virus is not intentionally destructive does not mean that it does not cause any damage. There are several reports of incompatibilities with other software; or of panicking users, that have formatted their disks; or, at least, damage caused by time loss, denial of computer services, or expenses removing the virus. It is well known, that "there ain't ...
28: Software Ownership 2
Software is composed of many programs that all together fulfill a certain task. Programs are strict instructions that tell the computer what to do. A computer is a complex machine that uses directions like programs and software to operate, without it it s useless. In other words, software brings life to a computer s hardware. More precisely, it represents what fuel is to a car. There are two categories of software; operating systems and applications. Both of them are a necessity to ...
29: Computer Crimes
... tried before but instead of people learning about it through mail they now find the schemes through computer, and believe they are true. Another form of computer crime that you wouldn’t think of is software piracy. Software piracy is making unauthorized copies of software, which is a violation of the copyright law. Although making the copies is illegal the problem has reached epidemic proportions because many people are unaware of or ...
30: Computer Crimes
... tried before but instead of people learning about it through mail they now find the schemes through computer, and believe they are true. Another form of computer crime that you wouldn’t think of is software piracy. Software piracy is making unauthorized copies of software, which is a violation of the copyright law. Although making the copies is illegal the problem has reached epidemic proportions because many people are unaware of or ...


Search results 21 - 30 of 774 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved