Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
• American History
• Arts and Movies
• Biographies
• Book Reports
• Computers
• Creative Writing
• Economics
• Education
• English
• Geography
• Health and Medicine
• Legal Issues
• Miscellaneous
• Music and Musicians
• Poetry and Poets
• Politics and Politicians
• Religion
• Science and Nature
• Social Issues
• World History
Members
Username: 
Password: 
Support
• Contact Us
• Got Questions?
• Forgot Password
• Terms of Service
• Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 2711 - 2720 of 8980 matching essays
< Previous Pages: 267 268 269 270 271 272 273 274 275 276 Next >

2711: Computer Crime Is Increasing
... with the requisite skills, knowledge, access, and resources. Much of known computer crime has consisted of entering false data into computers. This method of computer crime is simpler and safer than the complex process of writing a program to change data already in the computer. Now that personal computers with the ability to communicate by telephone are prevalent in our society, increasing numbers of crimes have been perpetrated by computer hobbyists, known as "hackers," who display a high level of technical expertise. These ...
2712: Computer Science
... processing center in a computer. This new technology revolutionized the computer industry by dramatically reducing the cost of building computers and greatly increasing they're processing speed. The microprocessor made possible the advent of the personal computer, which resulted in an explosion in the use of computer applications. Between the early 1970s and 1980s, computer science rapidly expanded in an effort to develop new applications for personal computers and to drive the technological advances in the computing industry. Much of the earlier research that had been done began to reach the public through personal computers, which derived most of their early software from existing concepts and systems. Computer scientists continue to expand the frontiers of computer and information systems by pioneering the designs of more complex, reliable, and ...
2713: Networks
... must first be up and running on the Win95 portion of the network before Lantastic is installed or hooked up to other O/S's. The software cost for Lantastic is approximately $75 per user. Personal Network (by NDC) is the closest to a canned network available. For the two user cost of about $300 you get cards, cables, and Novell's Personal Netware which provides tight management over access and resources. However, like Netware 4.1, administration can be troublesome since DOS codes and switches are required for the initial setup and any system maintenance. The major ... run only under Windows 3.1; DOS only stations or Win95 stations are not supported and has a slow transfer rate of about 75 Kbps. Aviator Wireless (by Momentum Microsystems) is somewhere between Lantastic and Personal Network. For about $250 aviator supplies two radio frequency transceivers which plug into a spare LPT port. It is designed to operate under Win95 and Windows 3.1 but not other O/S's. ...
2714: Silicon Science: The Job of a System Analyst
... profession, people often work alone, but still need to be an effective team worker. This is a skill that can be developed at all levels. Others may think that being a team worker is a personal characteristic, but for some, it is something they need to work at to achieve. Personal characteristics are something that a person possesses and are difficult to change. Two personal characteristics that a system analyst should possess are humility and confidence. These two characteristics are closely tied together, yet they contradict each other in some ways. They must be able to admit their mistakes, ...
2715: The Computer Underground
... for potentially "dirty infor- mation" (Thomas and Marquart, 1988). Our own data are no excep- tion and derive from several sources. First, the bulk of our data come from computer bulletin board systems. BBSs are personal computers (PCs) that have been equipped with a telephone modem and special software that con- nects users to other PCs by telephone. After "logging in" by supplying a valid user name and password, the user ... archist influence. [5] In January, 1990, the co-editor of the magazine was indicted for allegedly "transporting" stolen property across state lines. According to the Secret Service agent in charge of the case in Atlanta (personal communication), the offender was apprehended for receiving copies of E911 ("enhanced" 911 emergency system) documents by electronic mail, but added that there was no evidence that those involved were motivated by, or received, material gain ... 1125, 222-226. Sandza, Richard. 1984. "The Night of the Hackers." Newsweek, 104(November 12): 17-18. Schwartz, Eddie. 1988. "Special on 'Computer Hacking.'" WGN Radio, Sept 27. Sennett, Richard. 1979. The Uses of Disorder: Personal Identity and City Life. New York: Vintage Books. Thomas, Jim and James B. Marquart. 1988. "Dirty Knowledge and Clean Conscience: The Dilemmas of Ethnographic Research." Pp. 81-96 in D. Maines and C. Couch ( ...
2716: Review of On-line Publications
... is complimented by many color and black and white pictures. Many of the stories incorporated graphics which lead to a very contemporary wed designed look. The most compelling aspect of the paper was the feature “personal times”. Personal times, is a customized news paper designed from the readers general interests. The feature was one of many which distinguished the times from any other I reviewed. Overall the times was a very exciting newspaper ... my installment for the North American continent. It is a very efficient news paper that maximizes all the space it uses and loads very rapidly. I has distinct departments such as: a net guide, a personal finance section and a trivia page. It is similar to other western papers in that it has an extensive world news section that is very comprehensive. In the world section is a scrolling synopsis ...
2717: Past, Present, and Future of Computers
... are teenagers who are looking to gain more information. Of course, some are dedicated to destruction and random violence, but there always will be those types of people in the world. Of course, there is personal information that is transmitted over the Internet that no one but the inteded party and yourself should have access to (i.e. your credit card numbers and expration dates) but who decides what is and what isn't personal information. This is a problem that has greatly prevented the growth of the Internet into major companies. In the future, it can only get worse. At the rate we are going, everything will be computerized ... information. If you have ever seen the movie ³The Net² , you know exactly what I am talking about. If all information is stored electronicaly, anyone with the desire can view, change, remove, or add your personal attributes. With enough effort, one could take away someone's entire identity. This may seem like a futuristic sci-fi novel, but it could be in our not so distant future. The future of ...
2718: Investigative Report Of Internet Addiction
... users in her study all met psychiatric criteria for clinical dependence applied to alcoholics and drug addicts. They had lost control over their Net usage and couldn't end it despite harmful effects on their personal and professional lives. What Causes It Finding a reason for Internet addiction can be as hard as finding a reason for smoking addiction, however, there are a couple of reasons that are obvious for some ... example, people who become addicted to alcohol and other drugs usually have serious deficiencies in their life management, stress management, and interpersonal skills. Early on in life, they experience a great deal of pain and personal suffering that they can't figure out how to deal with effectively. This drives them to seek external relief and comfort in the form of alcohol or other substances. As this pattern of behaviour gets ... sucked in. CONCLUSION Internet addiction is a serious addiction that should not be taken lightly, it might not be life threatening like some drug addiction, but it can very harmful to the person professional and personal life. The key to staying away from this addiction is to understand its elements and have a strong will power to control one's self from all the temptations that the Internet might provide. ...
2719: Integration Of UMTS And B-ISDN: Is It Possible Or Desirable?
... BACKGROUND The Universal Mobile Telecommunication System (UMTS), the third generation of mobile networks, is presently being specified as part of the European RACE technology initiative. The aim of UMTS is to implement terminal mobility and personal mobility within its systems, providing a single world mobile standard. Outside Europe, UMTS is now known as International Mobile Telecommunications 2000 (IMT2000), which replaces its previous name of Future Public Land Mobile Telecommunication System (FPLMTS ... integration into future networks", IEE Electronics and Communication Engineering Journal, June 1993. [BROE93b] W. van den Broek and A. Lensink, "A UMTS architecture based on IN and B-ISDN developments", Proceedings of the Mobile and Personal Communications Conference, 13-15 December 1993. IEE Conference Publication 387. [BUIT95] E. Buitenwerf, G. Colombo, H. Mitts, P. Wright, "UMTS: Fixed network issues and design options", IEEE Personal Communications, February 1995. [CHEU94] J. C. S. Cheung, M. A. Beach and J. P. McGeehan, "Network planning for third-generation mobile radio systems", IEEE Communications Magazine, November 1994. [MINZ89] S. E. Minzer, "Broadband ISDN ...
2720: History of Computers
... of the computer had created many styles and types that were greatly dependent on a well defined purpose. The computers of the 1990's roughly fell into three groups consisting of mainframes, networking units, and personal computers. Mainframe computers were extremely large sized modules and had the capabilities of processing and storing massive amounts of data in the form of numbers and words. Mainframes were the first types of computers developed ... revealing, "... the number of hosts on the Internet began an explosive growth. By 1988 there were over 50,000 hosts. A year later, there were three times that many" (Campbell-Kelly and Aspray 297). The personal computers that are in large abundance in the 1990's are actually very simple machines. Their basic purpose is to provide a usable platform for a person to perform given tasks easier and faster. They ... games have been developed to play on these types of computers. These computers are the most numerous types in the world due to there relatively small cost and size. The internal workings and mechanics of personal computers primarily consisted of a central processing unit, a keyboard, a video monitor and possibly a printer unit. The central processing unit is the heart and brains of the system. The functions of the ...


Search results 2711 - 2720 of 8980 matching essays
< Previous Pages: 267 268 269 270 271 272 273 274 275 276 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved