Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
• American History
• Arts and Movies
• Biographies
• Book Reports
• Computers
• Creative Writing
• Economics
• Education
• English
• Geography
• Health and Medicine
• Legal Issues
• Miscellaneous
• Music and Musicians
• Poetry and Poets
• Politics and Politicians
• Religion
• Science and Nature
• Social Issues
• World History
Members
Username: 
Password: 
Support
• Contact Us
• Got Questions?
• Forgot Password
• Terms of Service
• Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 3391 - 3400 of 4904 matching essays
< Previous Pages: 335 336 337 338 339 340 341 342 343 344 Next >

3391: Computers Related To Turf Grass Industries
... their product.(Beard 101) If one day I am searching for a new fairway mower, I can bypass the phone calls and written estimates, and go strait to the information. Toro, Ransome, Jacobsen, and even John Deere all have home pages. You can inquire on a certain mower model, engine size or anything you need to know. It will list a price and even the shipping and handling and the salesman ...
3392: Computer Fraud and Crimes
... become an issue of the past. Works Cited Bitter, Gary G., ed. The MacMillian Encyclopedia of Computers. MacMillian Publishing Company: New York, 1992. Gates, William. The Road Ahead. New York : Penguin Books, 1995. Hafner, Katie & John Markoff. Cyberpunk. New York : Simon and Schuster, 1991. Romney, Marshall. "Computer Fraud – What Can Be Done About It?" CPA Journal Vol. 65 (May 1995): p. 30-33.
3393: The History and Future of Computers
... 800 square feet on the floor and having 18,000 vacuum tubes. It was also very limited in programmability, but it was very efficient in the programs that it had been designed for. In 1945 John von Neumann along with the University of Pennsylvania came up with what is known as the stored-program technique. Also due to the increasing speed of the computer subroutines needed to be repeated so that ...
3394: Computer Pornography
... just be another way of getting around it. One example is encryption. This is a form of false information sent to another person via the Net and translated on the other side. As Internet pioneer John Gilmore once said, " The Net interprets censorship as damage and routes around it(Barlow: 76)." I decided to try "trading" myself and was startled when I completed two online interviews with some known traders. The ...
3395: CMIP vs. SNMP : Network Management
... in Palo Alto, California (Borsook, 48). Because of SNMP's smaller size, it has even been implemented in such devices as toasters, compact disc players, and battery-operated barking dogs. In the 1990 Interop show, John Romkey, vice president of engineering for Epilogue, demonstrated that through an SNMP program running on a PC, you could control a standard toaster through a network (Miller, 57). SNMP is by no means a perfect ...
3396: Can Computers Think? The Case For and Against Artificial Intelligence
... way, can computers think? The issue is contested as hotly among scientists as the advantages of Superman over Batman is among pre-pubescent boys. On the one hand are the scientists who say, as philosopher John Searle does, that “Programs are all syntax and no semantics.” (Discover, 106) Put another way, a computer can actually achieve thought because it “merely follows rules that tell it how to shift symbols without ever ...
3397: Multimedia
... rejected the hostile takeovers that marked the media business in the 1980s. Instead, they have favored an array of alliances and joint ventures akin to Japan's loose-knit Keiretsu business groupings. TCI's boss, John Malone, evokes "octopuses with their hands in each other's pockets-where one starts and the other stops will be hard to decide." These alliances represent a model of corporate structure which many see as ...
3398: Artificial Intelligence
... research. Researchers have long been interested in developing an accurate computer-based system capable of understanding human speech as well as accurately identifying one speaker from another. · Current Research Ben Yuhas, a computer engineer at John Hopkins University, has developed a promising system for understanding speech and identifying voices that utilizes the power of neural networks. Previous attempts at this task have yielded systems that are capable of recognizing up to ...
3399: Computer Communications
... you can view people is by how they choose to display themselves. Because you can't see other users, you can't make any prejudgments based upon race, sex, or physical handicap. As stated by John R. Levine and Carol Baroudi in The Internet for Dummies, 'Who you are on the Internet depends solely on how you present yourself through your keyboard." The reason for this is simple. The people who ...
3400: A Long Way From Univac
... it is impossible to fathom where computers will be in a thousand, or even a hundred years. One thing, however, is certain: computers are the most important advancement our society has ever seen. BIBLIOGRAPHY Rizzo, John and K. Daniel Clarke. How Macs Work. New York: Ziff-Davis Press, 1996. Hassig, Lee, Margery A. duMond, Esther Ferrington, et al. The Personal Computer. Richmond: Time Life, 1989. Silver, Gerald A. and Myrna L ...


Search results 3391 - 3400 of 4904 matching essays
< Previous Pages: 335 336 337 338 339 340 341 342 343 344 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved