Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 521 - 530 of 4442 matching essays
< Previous Pages: 48 49 50 51 52 53 54 55 56 57 Next >

521: Crime and Punishment
Crime and Punishment Ever since the beginning of modern society, crime and punishment have been linked together. Depend on the seriousness of the crime, those who break the laws are punished accordingly. As the amount of homicide increased in the passed several years, people are demanding tougher punishments for more murder. Among them, the most supported one was ...
522: Internet Regulation: Policing Cyberspace
... a segment of the population does not. Legislative regulation of the Internet would be an appropriate function of the government. The Communications Decency Act is an amendment which prevents the information superhighway from becoming a computer "red light district." On June 14, 1995, by a vote of 84-16, the United States Senate passed the amendment. It is now being brought through the House of Representatives.1 The Internet is owned ... great length to make certain that above all else, the profiteering pornographer, the pervert and the pedophile must be free to practice their pursuits in the presence of children on a taxpayer created and subsidized computer network.3 People like this are the ones in the wrong. Taxpayer's dollars are being spent bringing obscene text and graphics into the homes of people all over the world. The government must take ... most popularly associated with the Internet, are members of a rebellious society that are polluting these networks with information containing pornography, racism, and other forms of explicit information. When they start rooting around for a crime, new cybercops are entering a pretty unfriendly environment. Cyberspace, especially the Internet, is full of those who embrace a frontier culture that is hostile to authority and fearful that any intrusions of police or ...
523: Explain the importance of Contingency Planning
... risks or emergencies that contingency planners may consider include explosions, spills and chemical leaks, accidental disclosure, angry or hostile clients, armed holdups, blackmail attempts, break & enter, bribery, building structural collapse, chemical / biological hazards, civil unrest, computer malfunction, contamination, criminal acts affecting business by outsiders, criminal acts by staff, currency fluctuations, natural hazards, deliberate disclosure of data by staff, demonstrations, design error, disclosure to opposition of business and/or marketing plans, disgruntled staff, embezzlement, espionage, failure of testing procedures, fraud, hacking of computer systems, hostage situations, injury to staff or clients through accidents, litigation by client or supplier, loss of data & records, major price undercutting by opposition, malicious rumour mongering by opposition, millennium bugs, non-insurance payouts, non-paying customers, O,H & S injuries to staff or clients, organised crime, violence pollution - money laundering, power loss/ failure/cut-off, ram-raids, sabotage, sexual assault on staff or clients, sharemarket upheaval, shoplifting, sieges, sit-ins, smuggling, staff death from disease, staff pilfering / staff theft, substandard ...
524: Reality - What It Is And How It Works
... physical, chemical, and entertainment uses among other things. In order to create this alternate reality, however, you need to find ways to create the illusion of reality with a piece of machinery known as the computer. This is done with several computer-user interfaces used to simulate the senses. Among these, are stereoscopic glasses to make the simulated world look real, a 3D auditory display to give depth to sound, sensor lined gloves to simulate tactile feedback ... the way that person's ears impose a complex signal on incoming sound waves in order to encode it in their spatial environment. The map of the results is then converted to numbers and a computer performs about 300 million operations per second (MIPS) to create a numerical model based on the HRTF which makes it possible to reconfigure any sound source so that it appears to be coming from ...
525: Virtual Reality Technology and Society
... from the artist Myron Krueger, the scholar Howard Rheingold, and the novelist William Gibson. The technological components used in virtual reality systems include the following: video display, audio input, tactile response, interactive input, and the computer hardware and software. Although a complete compilation of all the devices involved in this arena are beyond the scope of the paper, a discussion of the general areas of equipment, along with several examples of ... the other hand Rheingold dove more into what actually makes up virtual reality. He states: "that the idea of immersion (using stereoscopy, gaze-tracking, and other technologies to create the illusion of being inside a computer generated scene) is one of the two foundations of virtual reality technology. The idea of navigation (creating a computer model of a molecule or a city and enabling the user to move around, as if inside it) is the other fundamental element" (Rheingold 1991, 202). It is important to remember that these definitions ...
526: Computers That Mimic The Human Mind
... mind-body problem. Most of the day the human mind is taking in information, analyzing it, storing it accordingly, and recalling past knowledge to solve problems logically. This is similar to the life of any computer. Humans gain information through the senses. Computers gain similar information through a video camera, a microphone, a touch pad or screen, and it is even possible for computers to analyze scent and chemicals. Humans also ... year speech recognition software products have become mainstream(Lyons,176). All of the ways that humans gain information are mimicked by computers. Humans then proceed to analyze and store the information accordingly. This is a computer’s main function in today’s society. Humans then take all of this information and solve problems logically. This is where things get complex. There are expert systems that can solve complex problems that humans ... is where current technology put obstacles in the way of Artificial Intelligence. The human mind is a complex system of brain cells or neurons which accomplishes all of these tasks. Silicon chips, the hardware a computer, is extremely similar to the human brain. The human brain has over ten billion cells, and the largest cell has 200,000 inputs(Levin,30). Neurons run in parallel which adds up to trillions ...
527: Cyberspace
... a segment of the population does not. Legislative regulation of the Internet would be an appropriate function of the government. The Communications Decency Act is an amendment which prevents the information superhighway from becoming a computer "red light district." On June 14, 1995, by a vote of 84-16, the United States Senate passed the amendment. It is now being brought through the House of Representatives.1 The Internet is owned ... great length to make certain that above all else, the profiteering pornographer, the pervert and the pedophile must be free to practice their pursuits in the presence of children on a taxpayer created and subsidized computer network.3 People like this are the ones in the wrong. Taxpayer's dollars are being spent bringing obscene text and graphics into the homes of people all over the world. The government must take ... most popularly associated with the Internet, are members of a rebellious society that are polluting these networks with information containing pornography, racism, and other forms of explicit information. When they start rooting around for a crime, new cybercops are entering a pretty unfriendly environment. Cyberspace, especially the Internet, is full of those who embrace a frontier culture that is hostile to authority and fearful that any intrusions of police or ...
528: Cdr
... invisible, one visible. The invisible, is used for writing data onto the surface of the blank CD. The visible, is for reading information off the CD. The unit itself is currently for use in a computer system only, and therefor must be installed like a normal CD drive. The two CD drives then run coherently to copy data from one cd to another. CDR was introduced around 5 years ago, but ... no such rule applies. In the manual of the Philips CDR 870 Compact Disk Recorder it reads: “Important. It is a criminal offence under applicable copyright laws, to make unauthorised copies of copyrighted material, including computer programs, films, broadcasts and sound recordings. This equipment should not be used for such purposes.” However on the opposite page it says: “Subject to certain legal constraints on copying, you can make your own CDs ... only cost to society is that you can not write onto a CDR without a CD Writer. For a group at work it is costly if you try to install a CD Writer into every computer. For the individual, CDR allows the backing up of data and creation of personal CD’s. Floppy disks are still the standard in Re-Writable storage, but as the speed and cost of CD ...
529: Surfing The Internet
... withstand partial outages (like bomb attacks) and still be able to function. From that point on, Internet developers were responding to the market pressures, and began building or developing software for every conceivable type of computer. Internet uses started out with big companies, then to the government, to the universities and so on. The World Wide Web or WWW, is an information service that is on the Internet. The WWW is ... is only getting bigger and if people don't start utilizing it's resources they could be road kill on this Information Superhighway. Hey, I'll bet in the middle of that last sentence another computer just got on-line to the Net. There are three major features of the Internet, On-line discussion groups, Universal Electronic Mail, files and software. There's about 11,000 on-line discussion groups called ... else who is on-line, anywhere in the world and in seconds. The third feature I mentioned was files and software. This in my opinion is the most impressive one. All the thousands of individual computer facilities connected to the Internet are also vast storage repositories for hundreds of thousands of software programs, information text files, video and sound clips, and other computer based resources. And their all accessible in ...
530: Crime And Punishment
“…the buzzing and struggling of some large fly as it swooped and beat against the windowpane.” (Crime and Punishment, pg. 332) In the novel Crime and Punishment by Fydor Dostoevsky the main character Rodion Romanovich Raskolnikov consciously avoids truth and clarity of mind as he clings to his theory of the ordinary and extra-ordinary people, believing himself to be ... s room is “suffocatingly hot, but [Katerina] [has] not opened the windows” and in Alyona’s apartment “all the windows … [are] closed, in spite of the stifling heat” (pg 114) the day he commits the crime. In the former place he leaves money on the windowsill, while in the latter he takes money away. In both cases, however, the rooms are hot, and a feeling of an uncomfortable and unfriendly ...


Search results 521 - 530 of 4442 matching essays
< Previous Pages: 48 49 50 51 52 53 54 55 56 57 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved