Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support

Search Essays:   

Technology: Friend Or Foe?

.... will preserve our identity. Governments acting as a global police force protecting us from ourselves can easily monitor the electronic trail of commands and transactions. Perhaps the Luddites could see farther into the future than anyone suspected. With regards to the downfall of technology and the role it would play on people's lives, as they became dependent upon technology for survival. Let's take for example the huge technological dilemma of the fast approaching twenty-first century; the issu .....

[ Download This Essay Now ] Number of words: 649 | Number of pages: 3

The Internet

.... networks of that time were chained point-to-point, with each place on the network dependent on the link before it. If one point in the network were blown up, the whole network would become useless. Paul Baran, one of the Rand thinkers on the project, conceived the idea for a new kind of communications network that wasn't organized point-to-point, but instead was set up more like a fishnet. He believed this structure could allow information to find its own path through the network even if a section ha .....

[ Download This Essay Now ] Number of words: 1250 | Number of pages: 5

What Is An Information Systems Project

.... could cause a delay and increase the cost and reduce profit. Time management and people skills are a must to be a successful project manager. 2. Stud the enclosed article “HOW MUCH TECHNICAL TRAINING DOES A PROJECT MANAGER NEED?” Then, answer the question, supporting your answer. For support, you are not limited to the enclosed article. As stated in the article a project manager needs enough knowledge not to be snowed. In the military commissioned officers are put into positions that they .....

[ Download This Essay Now ] Number of words: 528 | Number of pages: 2

Computer Security

.... of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker .....

[ Download This Essay Now ] Number of words: 2494 | Number of pages: 10

America And The Computer Industry

.... (Soma, 14). The next innovation in computers took place in 1694 when Blaise Pascal invented the first Òdigital calculating machineÓ. It could only add numbers and they had to be entered by turning dials. It was designed to help PascalÕs father who was a tax collector (Soma, 32). In the early 1800Õs, a mathematics professor named Charles Babbage designed an automatic calculation machine. It was steam powered and could store up to 1000 50-digit numbers. Built in to his machine were operations tha .....

[ Download This Essay Now ] Number of words: 2605 | Number of pages: 10

The Evolution Of The Saw

.... was not very specialized. It would react differently under different conditions. Eventually more complex designs were discovered. These new designs allowed for the precision cutting of hardwood, softwood, with the grain, against the grain, and even raked out the unwanted sawdust. These saws differed in the layout of the teeth. Instead of the jawbone patter the teeth were placed in a "left-right-angled" pattern, to rake the sawdust, and were placed at different distances depending on the substance bein .....

[ Download This Essay Now ] Number of words: 711 | Number of pages: 3

Online Censorship

.... and ideas can no longer be stopped at the physical territorial borders. We must also examine the meaning of the concept to “seek and receive” and to “impart” information. National restrictions on speech have a direct and negative impact on the ability of Internet users around the world to “seek and receive” information and ideas, as well as their right to “impart” information. For example, if citizens of one country are prohibited from discussing political issues online, then not only are the .....

[ Download This Essay Now ] Number of words: 1143 | Number of pages: 5

A Detail Look Into The Internet And Where It Is Headed!

.... News from across the country could be received shortly after it occurred. Citizens no longer had to wait for the copy of the morning paper to hit the newsstands’(Bergeen 3). The television was invented on the heels of radio. ‘In 1920 the first primitive TV’s were born, however the media did not become persuasive until the 1950’s when they became more affordable’(Strate 2). They soon replaced the radio as the media form of choice. The newest and currently most controversial form of mass media and comm .....

[ Download This Essay Now ] Number of words: 1818 | Number of pages: 7

Censor The Internet?

.... Besides taking as extraordinary amount of time and money, attempts to censor the Internet violate freedom of speech, a right that is included in democratic constitutions and international laws (Silencing the Net…). It would be a breach of the First Amendment. The Constitution of the united States of America Declares that "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the .....

[ Download This Essay Now ] Number of words: 1632 | Number of pages: 6

Business And The Internet

.... twenty-four hours a day, seven days a week. Since the Internet can be accessed by millions of people all time, it would be a great incentive for businesses. The Internet can help businesses in number of extraordinary ways. First, the Internet is an excellent way to make business information available to possible consumers. Say a person hears about a product that your business produces and would like to know more information about that product. Well, through Internet access, that person can easily locate .....

[ Download This Essay Now ] Number of words: 1090 | Number of pages: 4

Freedom Of Speech On The Internet

.... Internet Empowerment Coalition). The CIEC found and posted on their website some obvious problems with the CDA. “This law would prohibit texts of classic fiction such as the Catcher in the Ryer, Ulysees, “Seven Dirty Words” by George Carlin, and other materials which, although offensive to some, enjoy the full protection of the First Amendment if published in a newspaper, magazine, or a book, or in the public square”(CIEC). Hot-Wired, a very popular and prestigious Internet magazine, now famous f .....

[ Download This Essay Now ] Number of words: 1284 | Number of pages: 5

Anti-government Censorship On The Internet

.... attention to the issue of Cyberporn. The title "On a screen near you: Cyberporn" was on Times July 3rd cover issue. this in a sense sent Washington into an uproar. Thinking that young children could get uncensored porn pictures off the Internet created chaos among the politicians. the Time cover story looked very convincing for many Americans who are uneducated about the Internet access. It suggested there was a sincere problem with uncensored material on the Internet. According to Time arti .....

[ Download This Essay Now ] Number of words: 1315 | Number of pages: 5

History Of Computers

.... was made up of 78 adding machines and calculators. Although Howard’s model was automatic, it was controlled by instructions punched into a roll of paper tape. There was a need for an all-electronic machine. This project was taken up by Dr. J. Presper Eckert Jr., and Dr. John W. Mauchly, with help from a few of their colleagues, in the spring of 1946. For two and a half years, they work diligently to construct a machine called the Electronic Numerical Integrator and Calculator, or ENIAC. This machi .....

[ Download This Essay Now ] Number of words: 838 | Number of pages: 4

Computer Viruses

.... scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer criminals of which we know very little about them, their motives, and their tools of the trade. Therefor .....

[ Download This Essay Now ] Number of words: 1766 | Number of pages: 7

Computer Science

.... same technology used in the various forms of magnetic tape from audiocassette to videocassette recorders. One of the first computer storage devices was the magnetic tape drive. Magnetic tape is a sequential data storage medium. To read data, a tape drive must wind through the spool of tape to the exact location of the desired information. To write, the tape drive encodes data sequentially on the tape. Because tape drives cannot randomly access or write data like disk drives, and are thus much slower, th .....

[ Download This Essay Now ] Number of words: 803 | Number of pages: 3

« prev  32  33  34  35  36  next »


 Copyright © 2003 Essay Galaxy.com. All rights reserved