


|
Enter your query below to search our database containing over 50,000+ essays and term papers
Search results 4481 - 4490 of 4643 matching essays
- 4481: History of the Internet
- ... in chat rooms in terms of what should be discussed and what shouldn't. This lead to other disagreements in terms of the First Amendment in that regulation of chat rooms is against the constitutional rights of the people. This has lead to government interaction, which is often unsuccessful, in terms of trying to decide on what is acceptable for the on-line community and what is not. Since the Internet ...
- 4482: Technological Literacy
- ... Baltic states, the conflict in Chiapas, Mexico, and the year leading up to the 1995 Fourth UN Conference on Women in Beijing, women have been active on-line alerting the west about issues including human rights violations, rape as widespread weapons of war and, in the case of the Beijing U.N. Conference, Chinese efforts to exclude Tibetan women. In short, the overwhelmingly male population of cyberspace, the distinctively gendered dimension ...
- 4483: The Computer and Mass Communication
- ... sits the telephone, and that, too, ties me in to an information network. There are more than 500 million phones in the world, and if I knew the number and were willing to pay the bill, I could reach any of them. And as I do my work, I almost always have the radio on, picking a station from dozens of possibilities of broadcast entertainment and news. There is an astonishing ...
- 4484: The Microsoft House
- ... Microsoft developed a house packed with fun technological features. They called their work the “House of the Future” and the one phrase to describe that future is “everything digital”. The chairman of this project is Bill Gates- Chairman and CEO of the Microsoft Corporation, Gates had some interesting things to say at a conference in Seattle, Washington on July 22, 1999: “The dawn of the new century will see the birth ...
- 4485: Setting Up A Computer Network
- ... be able to access computers in the lab by using passwords. You can setup a password on a server in the office for the employees to connect to the labs and not give the labs rights to access the office. This can be done by the use of certain protocols. The protocol that you will need for the office will be the same as the three labs, TCP/IP and IPX ...
- 4486: Technology
- ... complicated role in one of the things that everybody uses in their everyday lives, our cars. Most people don't realize how much our cars have been taken over by technology, until they get the bill after one of these computers go out. Just about everything in a new car is controlled by a computer, a computer will read and recognize your driving patterns and adjusts how and when the transmission ...
- 4487: Modernization of Air Warfare
- ... for $2 billion. Each B-2 cost $437.4 million to build. After the military liked the bomber, they originally ordered 133 of them, then they cut back to 75 because of the deficit-reduction bill. Then, in 1992, the House of Representatives voted to buy only twenty, and later only 15 saying that 10 would be enough. With four General Electric engines with 19,000 pounds of thrust each, the ...
- 4488: Computers in the Workplace: Are They Used Ethically?
- ... as these vary in sophistication and are usually quite expensive. As a result, very few companies make these purchases. Aren't these companies discriminating against the handicapped? Many legislators are actively working to pass a bill that will make this form of discrimination illegal. In addition, software piracy, or theft, has become a major concern of software writers and manufacturers. The act of piracy is not as dramatic as it sounds ...
- 4489: Computer Software Piracy
- ... Bulletin Board System), software "pirates" thrive freely online. These so called "pirates" operate by uploading pieces of software, commonly referred to as "warez", into an online service's database then sending through e-mail the rights to download them. "The Information Superhighway has opened the door to a new kind of highway robbery - the home shoplifting network" . When you access a online service, you are identified through an account which most ...
- 4490: History of Computers
- ... then on computers started to become more advanced. Many companies now exist that produce computer hardware, and software. These companies are among the richest in the world, in fact, the richest man in the world, Bill Gates, is the owner of Microsoft, one of the largest computer companies around. Computers have replaced many things. Instead of tellers, people can use ATM machines; instead of typewriters, people can use one of the ...
Search results 4481 - 4490 of 4643 matching essays
|