|
Enter your query below to search our database containing over 50,000+ essays and term papers
Search results 511 - 520 of 832 matching essays
- 511: The Computer Underground
- ... other) issues that CU participants face, and the methods they use to resolve them. As with any ethnographic research, steps have been taken to protect the identity of informants. The culture of the computer underground aids the researcher in this task since phreakers, hackers, and pirates regularly adopt pseudonyms to mask their identity. However to further ensure confidentiality, all of the pseudonyms cited in this research have been changed by the ...
- 512: Morality and Ethics and Computers
- ... of monitoring-such as genetic screening-could eventually be used to discriminate against individuals not because of their past but because of statistical expectations about their future."7 For instance, people who do not have AIDS but carry the antibodies are being discharged from the U.S. military and also fired from some jobs. Who knows if this kind of medical information could lead employers to make decisions of employment based ...
- 513: Beloved: The Symbolism of Trees
- ... a shoot no taller than his waist. The kind of thing a man would cut to whip his horse" (221). For Stamp Paid, an established savior, he feels the most comfortable when he helps and aids others. Stamp Paid's picking berries for Sethe and Denver symbolizes his comfort towards helping people with the goodness of nature: "...went off with two buckets to a place near the river's edge that ...
- 514: A Priest’s Death: An Examination of Uncanny Elements in James Joyce’s "The Sisters"
- ... smiled continually and why its lips were so moist with spittle" (11). His confessions, although not stated in the text, are clearly grave. The simoniac nature of his sin, another "defamiliarizing" addition to the story aids in the interpretation of the meaning. In the dream, the priest conveys to the boy his own cracked faith and a sense of the emptiness of the church. If simony represents a larger lack of ...
- 515: Barrio Boy and The House on Mango Street: A Character's Goals
- ... Mango Street by Saundra Cisneros give support to the critical lens. Their characters, Ernesto and Esperanza have very different lives, but they both have goals which effect their thoughts and their lives. Ernesto's life aids in the reinforcement of the critical lens. His goal was to fit in with his new school and neighborhood. He had self- confidence that allowed him to succeed. He thought of the Americans as strangers ...
- 516: Information Management
- ... suffers from a bottom up approach design. The accuracy of the data is compromised because no formal checks or guidelines exist as to what may be entered in to the system. The security aspect also aids to increase this problem. Duplicate records and anomalies are common place. The age of the system also hinders its accessibility. Although every employee is granted access, many find the system prone to crashes or incorrect ...
- 517: Ibm
- ... share a home which the named lover, that they are “committed” to couple hood and that their finance are “interdependent”. Cost-wise, the move may not be expensive for IBM, despite the higher incidence of AIDS among homosexuals. This will be offset by the other lower incidence of pregnancy in gay unions. IBM expected only one percent of its employees to take up the offer. IBM is the biggest of the ...
- 518: Hackers
- ... other) issues that CU participants face, and the methods they use to resolve them. As with any ethnographic research, steps have been taken to protect the identity of informants. The culture of the computer underground aids the researcher in this task since phreakers, hackers, and pirates regularly adopt pseudonyms to mask their identity. However to further ensure confidentiality, all of the pseudonyms cited in this research have been changed by the ...
- 519: Computer In The Classroom
- ... are trying to design. For everyone to be able to share this room and all of its functions, the room must be networked. This allows them access to each other's computers, resources, and troubleshooting aids. Suggested was a typical 100 base T network using Ethernet cable. Without a network, you have no Internet connection, no shared printers, and no shared drives. Using a network allows you to use previously mentioned ...
- 520: An Overview Of Hacking
- ... that can clone itself at will, over disks and phone lines, and usually causes some devastating impact on the target, such as deleting files, or even damaging the computer. Just like human viruses, such as AIDS, which changes form constantly to avoid destruction, some computer viruses, called polymorphic viruses, change slightly so that any previous anti-virus software will no longer detect it. This is why there are constantly new virus ...
Search results 511 - 520 of 832 matching essays
|