Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
• American History
• Arts and Movies
• Biographies
• Book Reports
• Computers
• Creative Writing
• Economics
• Education
• English
• Geography
• Health and Medicine
• Legal Issues
• Miscellaneous
• Music and Musicians
• Poetry and Poets
• Politics and Politicians
• Religion
• Science and Nature
• Social Issues
• World History
Members
Username: 
Password: 
Support
• Contact Us
• Got Questions?
• Forgot Password
• Terms of Service
• Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 1391 - 1400 of 4442 matching essays
< Previous Pages: 135 136 137 138 139 140 141 142 143 144 Next >

1391: Nuclear Energy 2
... joke! All day you sit around and watch the gages for reactor number two just to make sure they maintain their settings. You don t even need to look at the gages either because a computer automatically regulates them without you. Life is so good. Suddenly all the sirens go of and the gages and displays spin wildly in every direction. The ground shakes and you can hear the sound of ... 2). The problems of obtaining money and scientists are not big. The Soviet Union has left many of its top nuclear scientists without jobs and money. Many would be happy to get out of their crime ridden country to work for a terrorist group or another country associated with terrorism like Iran or Iraq. Money is not a problem for these two countries who hold some of the world s biggest ...
1392: Millennium Bug
... to our phone bills and savings accounts. The Millennium Bug is a design fault dating back to the early days of computers and the way they store time and date. When you turn on your computer it knows the time and date thanks to a built in clock which memorises the date in the form of month/day/year. The problem is that when we go from 99 to 00 many computers won't know whether this means the year 1900, 2000 or the year that the computer was created. This may cause havoc on society, especially now we are so reliant on computers in our everyday lives. As a result the Millennium Bug may cause major concerns in health, unemployment, our finance ... as British airways are so confident that the bug will have no effect on their systems, they are all going to fly in one of their planes during the change over period. On the ground computer sequenced traffic lights could have traffic in turmoil causing accidents and disruptions. Just as the clock is about to tick over, everyone will be focused on Australia due to the time difference. If the ...
1393: Internet History Report
... were the first ARPANET locations. The ARPANET is what is now called the Internet. The plan was unprecedented: A professor at UCLA, and his small group of graduate students hoped to log onto the Stanford computer and try to send it some data. They would start by typing "login," and asking by telephone if the letters appeared on the far-off monitor. On their first attempt, the L and O were ... rules of your federation. One way is to write out the entire match. This takes a long time and the results are based on the opinion of the commissioner. The other way involves using a computer to decide the winner. My federation uses Zeus , a computer program found on the Internet, to simulate the matches. The good thing about this type of match is it can be made quickly, the matches are fair and based on wrestlers attributes, and many ...
1394: Hard Drive Evolution
... to mainframe and minicomputer installations. Vast "disk farms" of giant 14 and 8 inch drives costing tens of thousands of dollars each buzzed away in the air conditioned isolation of corporate data centers. The personal computer revolution in the early 1980s changed all that, ushering in the introduction of the first small hard disk drives. The first 5.25-inch hard disk drives packed 5 to 10 MB of storage, the ... 5,000 pages of double-spaced typed information, into a device the size of a small shoebox. At the time, a storage capacity of 10 MB was considered too large for a so-called "personal" computer. The first PCs used removable floppy disks as storage devices almost exclusively. The term "floppy" accurately fit the earliest 8-inch PC diskettes and the 5.25-inch diskettes that succeeded them. The inner disk ... matchbox, was introduced. Of course, smaller form factors in and of themselves are not necessarily better than larger ones. Disk drives with form factors of 2.5 inches and less currently are required only by computer applications where lightweight and compactness are key criteria. Where capacity and cost-per-megabyte are the leading criteria, larger form factor drives are still the preferred choice. For this reason, 3.5-inch drives ...
1395: Electronic Commerce
... drive to the mall. Another reason for the boom in online commerce is the fact that the price of computers has been driven down by the Asian economy crisis. Families who could not afford a computer in the past now can. This holiday season the local Best Buy had a computer system advertised for $499.98, which included a monitor and a printer. This time last year the lowest price on a complete system was around $1199.98. According to a recent study by the Duncan group, only thirty-five percent of American households currently have a computer. About six percent of them even knew that they could really purchase online. When asked if they would consider purchasing online, and overwhelming sixty-seven percent said they would defiantly look on the Internet ...
1396: Cable Modems Are The Wave Of The Future
There are several different methods to achieve communication between computers. In the case of the Internet, most people use a telephone modem to establish a connection between their computer and the computer that gives them access to the Internet. Normally, the computer that gives them access to the Internet, referred to as an ISP (Internet Service Provider) can only have a limited number of users on it at any given time. In this case, users may ...
1397: Analysis On Electronic Data Imaging
... year searching for misplaced documents. The average missing file cost $120.00 in lost productivity. 80 percent of business documents are generated by computers and 60 percent of that is keyed right back into another computer-based system. Only seven percent of the most crucial information used to run organizations is stored on-line(Smith, 1999, p. 74). The research objective of this proposal will focus on determining what markets contain ... Image Management (AIIM), imaging is, "The ability to capture, store, retrieve, display, process, and manage business information in digital form"(Schroeder, 1996). Put simply, digital imaging means taking paper-based documents and converting them into computer-based documents. Instead of trying to move a document through the process faster, imaging uses innovation to shorten the path. Images appear where they are suppose to, when they are suppose to, in the order ... District Attorney's office now has more than 10 million pages of documents scanned and stored on the Internet(Mansfield, 1999). With this popular method, even CD's are unnecessary. Attorneys simply carry a laptop computer with them to access the Internet and quickly find the documents they need(Williamson, 1999). More advanced imaging systems allow work-flow processing to automate and re-engineer business processes. Document imaging systems can ...
1398: Treatment And The Sex Offender
... et al. (1998) article says that past research has shown that the public supports rehabilitation as a core goal of corrections. They say that over the past decade, the conservative campaign to get tough on crime has grown in strength and influence. Stundt et al (1998) article replicates a 1986 study by Cullen et al that explored attitudes toward correctional treatment. They found that public support for rehabilitation has declined , but ... been found to reduce deviant sexual arousal. The aversive behavioral rehearsal is a strong technique involving the offender acting out his sexual offense in the presence of the therapy group. They use act their sex crime out on a mannequin. The session is videotaped and later viewed by the offender. This lets the sex offender see what he looks like and sounds like while sexually abusing a victim. Since it is ... action against sexual predators in May 1997, when President Clinton signed the Jacob Wetterling Crimes against Children and Sexually Violent Offender Registration Act, which links establishment of a sex offender warning system to federal anti-crime funding. The new law went into effect in September of 1997, and requires all states to notify communities of the presence of sex offenders. The federal effort is modeled on New Jersey’s Megan’ ...
1399: Poverty
... County is extremely uneven. Things that help these small towns are efforts like Oxnard. A variety of things were done to help lower the unemployment rate. One important item is the big industry, like automation, computer, that came into the area. The government has been doing a lot to decrease unemployment. They have been creating government jobs for the people, a program which began in the couple years ago. In fact ... get an education. The high schools and colleges today must be upgraded to meet the future needs of our nation. In high schools and colleges across the nation all students must be familiar with the computer. Today, the computer is used for many purposes from simple spreadsheet to architectural designs. Another technological advance is the internet. The internet is almost a mandatory commodity today. The whole world is connected by the internet. The ...
1400: The Relation Between Abuse Neg
... Yet, there are exceptions to this. Some children just have problems brought about on their own. LITERATURE REVIEW The article "Adolescent Maltreatment and Delinquency: The Question of Intervening Processes" in the 'Journal of Research in Crime and Delinquency' brings out competing expectations for the maltreatment-delinquency association in delinquents through the use of data from a national survey. The three criminological theories: social control theory, social learning theory, and social-psychological ... put upon the child and affects the thought in his or head of what is right and wrong. REFERENCES Brezina, T. (1998). "Adolescent Maltreatment and Delinquency: The Question of Intervening Processes." Journal of Research in Crime and Delinquency. 35(1) 71-100. Cohn, A.W. (1996). "Juvenile Focus." Federal Probation. 60(4) 55-58. Goleman, D. (1995). "Early Violence Leaves Its Mark on the Brain." New York Times. C1, C10. Peters ... 476. Widom, C, S. (1996). "Childhood Abuse and It's Criminal Consequences." Society. 33(4) 47-54. Bibliography REFERENCES Brezina, T. (1998). "Adolescent Maltreatment and Delinquency: The Question of Intervening Processes." Journal of Research in Crime and Delinquency. 35(1) 71-100. Cohn, A.W. (1996). "Juvenile Focus." Federal Probation. 60(4) 55-58. Goleman, D. (1995). "Early Violence Leaves Its Mark on the Brain." New York Times. C1, C10. ...


Search results 1391 - 1400 of 4442 matching essays
< Previous Pages: 135 136 137 138 139 140 141 142 143 144 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved