Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
• American History
• Arts and Movies
• Biographies
• Book Reports
• Computers
• Creative Writing
• Economics
• Education
• English
• Geography
• Health and Medicine
• Legal Issues
• Miscellaneous
• Music and Musicians
• Poetry and Poets
• Politics and Politicians
• Religion
• Science and Nature
• Social Issues
• World History
Members
Username: 
Password: 
Support
• Contact Us
• Got Questions?
• Forgot Password
• Terms of Service
• Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 851 - 860 of 1468 matching essays
< Previous Pages: 81 82 83 84 85 86 87 88 89 90 Next >

851: Interactive Television
... American home. So what exactly is interactive television and what does it do? Interactive television is the ability literally to interact with the television set just like we do with a home computer on the Internet. With the advent of fiber optics and satellite communications, the communications industry will be able to transfer megabytes of information in fractions of a second. This will allow every American access to the information super ... be digital; analog will be a thing of the past. Large corporations like Microsoft and AT&T have already capitalized on multimedia and home PC's. There are already CD ROM applications that use the Internet for multimedia interactive purchasing of products and vacation plans. With interactive television, virtually everyone can advertise and sell products to anyone with access. Shopping for clothes, food, or any other product can be done from ...
852: Development of Computers and Technology
... The next generation of processors is slated to come out this year as well, being the next CPU from Intel, code named Merced, running at 233 MHz, and up. Another major innovation has been the Internet. This is a massive change to not only the computer world, but to the entire world as well. The Internet has many different facets, ranging from newsgroups, where you can choose almost any topic to discuss with a range of many other people, from university professors, to professionals of the field of your choice, to ...
853: Coping With Computers
... author owns a television production company. She also has her own column in Windows magazine. Her experiences with modern computer technologies range from the terminals of the 1970's all the through today with the Internet and e-mail. One of her first experiences with a computer involved sending a message over the AP news wire. As it turns out, she expressed her candid opinion on some very sensitive topics at ... administrator, she was referred to Columbia University's Center for Telecommunication Research. There, she negotiated a salary via e-mail, and whenever a system needs to be set up the ghost does it over the Internet. Of course, the bill is sent with e-mail as well. As of yet, she still has never seen the system administrator. Despite her negative or unusual experiences with the technological revolution, Ellerbee admits that ...
854: Computer System in the Context of Retail Business
... helps customers reduce time waiting in order to purchase goods. Globally, such as trading, eg: a computer retailing store may like to purchase some stock from over seas, they can make contracts by using the Internet. Computer systems in retail trading on a local and global scale played an important role in today's society. Computer systems such as : the supermarket POS system, provides efficient and accurate calculations when customers purchasing ... to public in the retailing that anyone can access? Business had to consider that before they take the action. Computer Crime- Computer Crime had been increasing due to the companies starts to join in to Internet and local area networks. Companies may set password protecting the data. * Ways that certain issues have been effected by the use of technology in retail establishments: Power- Power consumption were much higher than before due ...
855: Computer Systems Analyst
... future have and will see the computer. Since I have seen the computer, I have enjoyed the challenges and countless opportunities to gain in life from this machine. From school projects to games; from the Internet to programming languages; I have and always will feel like that little kid in the candy store. Job Description A Computer Systems Analyst decides how data are collected, prepared for computers, processed, stored, and made ... places where an analyst might perform his work thanks to the technology available today. Even technical support can be done from a remote location largely in part to modems, laptops, electronic mail and even the Internet. (“Computer Scientists” 94) So as the hours per week is starting to vary because of where the work can be done, so are the earnings. The industry is growing and according to the Occupational Outlook ...
856: Computer Viruses and their Effects on your PC
... was infected. What if my friend borrows an infected disk? Your friend's computer will most likely become infected the instant that he/she uses your disk into a computer. The third way, is the Internet. A lot of programs on the Internet contain live viruses. However, there seems to be countless numbers of ways to become infected. Every time you download a program from somewhere or borrow a disk from a friend, you are taking a risk ...
857: Battle of the Bytes: Macintosh vs. Windows 95
... Windows 95 shortcuts go beyond the Mac's, they can refer to data inside documents as well as to files and folders, and can also call up information on a local area network server or Internet site. Windows 95's plug and play system allows the operating system to read what's on your machine and automatically configure your new software that you need to install, however, this only works if ... work or home use. It is very helpful because it can educate people in the world that are not computer literate in a world that is being taken over by computers. Things such as the internet are used by many people, and it would certainly help if you needed to know what kind to buy so your would be compatible with someone else's. This entry tells that I am one ...
858: The Y2K Problem
... of Problems The scope of this problem is immense. The awareness and information available on this problem is growing rapidly, as a observation of the rate at which the amount of information available on the Internet has been growing. An advanced search of "year AND 2000 AND problem" through the Altavista index yielded 60000 pages! Even this volume of information does not sufficiently judge the magnitude of the problem. Early IBM ... be facilitated between systems. Why is this important? Most computer systems are networked and sharing information between many different operating systems and programs through the use of common protocols, like TCP/IP (Transport Control Protocol/Internet Protocol). Thus many systems are sharing largely incompatible and/or incomplete (the source of the 2000 problem) date information. The solution for this is to provide the complete date information in the form outlined by ...
859: A Look at Public Key Encryption
... RSA algorithms were eventually patented and licensed to RSA Data Security, such businesses as Apple, Microsoft, WordPerfect, Novell, and AT&T implemented the RSA software into there system. As the size and use of the Internet grows, the use of public key encryption in our everyday lives will grow. The use of public key is already found in transporting important information from computer to computer on the Internet, such as credit card numbers. When someone purchases something from a store on-line there card is encrypted by the browser using the stores public key, and then sent to the store in ciphertext, the ...
860: The Computer Underground.
... role in the computer underground is that of the software pirate. Software piracy refers to the unauthorized copying and distribution of copyrighted software. This activity centers around computer bulletin board systems, and parts of the internet that specialize in "warez." Pirates and phreak/hackers/crackers do not necessarily support the activities of each other, and there is distrust and misunderstanding between the two groups. At least part of this distrust lies ... the name "crackers," contribute greatly to the easy distribution of "warez." While p/hackers generally don't disapprove of piracy as an activity, especially "cracking pirates," they nevertheless tend to avoid pirate bulletin boards and internet sites partly because there is little pertinent phreak/hack information contained on them, and partly because of the belief that pirates indiscriminately abuse the telephone network in pursuit of the latest computer game. One hacker ...


Search results 851 - 860 of 1468 matching essays
< Previous Pages: 81 82 83 84 85 86 87 88 89 90 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved