Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 1801 - 1810 of 4262 matching essays
< Previous Pages: 176 177 178 179 180 181 182 183 184 185 Next >

1801: The Electronic Computer
... used mainly for scientific and technical calculations. In the 1950s, businesses, universities and government began using computers to store and process such nonmathematical data as orders, invoices, and personnel records. The use of computers for business data processing expanded enormously in the 1960s and has continued to increase at a rapid path ever since. The computers of the 1940s to 1960s were complex, expansive machines that were practical only for organizations ... of Boolean algebra, which plays an important role in the design and operation of modern computers. Near the end of the 19th century, the American engineer Herman Hollerith pioneered the automatic processing of statistical and business data. Today automatic data processing is one of the major application areas for computers. Babbage's dream began to come true in the 1930s with the construction of the first working computers. The earliest electromechanical ...
1802: Morality and Ethics and Computers
... If warned, does that make the practice okay? According to Kenneth Goodman, director of the Forum for Bioethics and Philosophy at the University of Miami, who teaches courses in computer ethics, "There's hardly a business that's not using computers."1 This makes these questions all the more important for today's society to answer. There are also many moral and ethical problems dealing with the use of computers in ... other thing that is just starting to become a problem is actual computer theft. With the introduction of notebook computers came a rise in computer theft. The same qualities that make these computers perfect for business travelers-their small size and light weight- make them very easy for thieves to steal as well. In 1994, 295,000 computers were reported stolen with resulting losses totaling over 981 million dollars. 9 The ...
1803: Windows 95 or NT
... to the general public in this day and age. However, in doing so each one of these operating systems has there good side and there bad side. Windows NT 3.51 was originally created for business use, but has ended up being more widely available for the average PC user in ones home. Windows 95 was developed for the sole purpose as an alternative to Windows NT. But has ended up ... downfalls to it is the fact that it can be only a device that is less then six to eight months old and carries the PnP logo. Windows NT 3.51 was developed more for business application (ex. Database, Spreadsheets, word processing and programming.) In the long run though Windows NT is less susceptible to system crashes. Windows NT does not carry the same Graphic User Interface as does Windows 95 ...
1804: The Anti-Trust Case Against Microsoft
... to United States citizens, creating higher prices and potentially downgrading software quality, and should therefore be stopped, while Microsoft and its supporters claim that they are not breaking any laws, and are just doing good business. Microsoft's antitrust problems began for them in the early months of 1990(Check 1), when the Federal Trade Commission began investigating them for possible violations of the Sherman and Clayton Antitrust Acts,(Maldoom 1 ... and if they pick the wrong one, they could be stuck down the road with a DVD player that is worthless. Had only one company set the standards, much like Microsoft has in the software business, there wouldn't be the confusion that arose, and the consumers could sit back and relax, knowing that the DVD format is secure and won't be changed. Another conclusion that many anti-Microsoft people ...
1805: Telecommunication
... that, if met would allow third party companies to sell and hook up their equipment to the telephone network. This turned the telephone industry upside down and challenged AT&T's monopoly in the telephone business. 3.2. So Gentelmen A' Will Be 65 With more and more electronic communication and the invention of VDTs the shortcomings of the Baudot code were realized. So in 1966, several telecommunications companies devised a ... Myself Up! After the breakup of the AT&T empire that controlled the modem industry, many other companies started to create new designs of modems. Hayes Microcomputer Products, took the lead in the PC modem business. Hayes pioneered the use of microprocessor chips inside the modem itself. The Hayes Smartmodem, introduced in 1981, used a Zilog Z-8 CPU chip to control the modem circuitry and to provide automatic dialing and ...
1806: Trends in Telecommunications
... not bothered by atmospheric conditions that affect wireless systems. It also offers an element of security in contrast to telecommunications systems that use the airwaves, where signals can be intercepted. So fiber optics will provide business users with a clearer, more reliable, more secure method of conducting business. Microcomputer Trends in the Nineties As more applications are done at microcomputers, including voice, data, and video functions, the hardware (micros and other types of display terminals) capacity must be increased. This includes: • increased random ...
1807: Escapism and Virtual Reality
... drills and car engines). Artificial environments such as hotels, offices and homes are maintained in pre- determined states of comfort by computers in the thermostats and lighting circuits. Within a high street shop or major business, every financial or stockkeeping transaction will be recorded and acknowledged using some form of computer. The small number of applications suggested above are so common to our experiences in developed countries that we rarely consider ... overall information about standards of health care is relatively insensitive, the comparative costs of treatment by different physicians is obviously highly sensitive information. Restricting the `flow 'of such information is a complex and time-consuming business. Predictions for future developments in computing applications are notoriously difficult to cast with any accuracy, since the technology which is driving the developments changes so rapidly. Interestingly, much of what has been developed so far ...
1808: Computer Fraud and Crimes
... therefore, more widely abused, is the use of electronic mail or email. In the present day, illegal hackers can read email going through a server fairly easily. Email consists of not only personal transactions, but business and financial transactions. There are not many encryption procedures out for email yet. As Gates describes, soon email encryption will become a regular addition to email just as a hard disk drive has become a ... unlock either. The numbers being used will probably be over 60 digits in length (Gates p.98-99). The Internet also poses more problems to users. This problem faces the home user more than the business user. When a person logs onto the Internet, he or she may download a file corrupted with a virus. When he or she executes that program, the virus is released into the system. When a ...
1809: Computer Crimes: Laws Must Be Pass To Address The Increase In Computer Crimes
... mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper. In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss. "While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems."(Alexander, V119) The ...
1810: Computers and Crime
... mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper. In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss. "While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems."(Alexander, V119) The ...


Search results 1801 - 1810 of 4262 matching essays
< Previous Pages: 176 177 178 179 180 181 182 183 184 185 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved