Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
• American History
• Arts and Movies
• Biographies
• Book Reports
• Computers
• Creative Writing
• Economics
• Education
• English
• Geography
• Health and Medicine
• Legal Issues
• Miscellaneous
• Music and Musicians
• Poetry and Poets
• Politics and Politicians
• Religion
• Science and Nature
• Social Issues
• World History
Members
Username: 
Password: 
Support
• Contact Us
• Got Questions?
• Forgot Password
• Terms of Service
• Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 781 - 790 of 8980 matching essays
< Previous Pages: 74 75 76 77 78 79 80 81 82 83 Next >

781: A "Full House" in the "Hand" of Education
... college professors yet more factors to consider when thinking about educational advise for students. She took her aunt's name and decided to make it lower case in order to emphasize the material in her writing and not herself. Her purpose is to motivate students to get an education because her own was difficult and hard--won. As she says, "To a southern black girl from a working--class background who ... or university, if they even do at all. She said that, "class differences were boundaries no one wanted to face or talk about"(87). But she believes that it is important to share experiences and personal stories in order to identify and connect with people from similar backgrounds. She says, "It is crucial that those among us who resist and rebel, who survive and succeed, speak openly and honestly about our lives and the nature of our personal struggles, the means by which we resolve and reconcile contradictions"(89). At the same time, she believes in speaking simply, with a language that is easily recognized and understood. She uses the example of ...
782: Computer Programming
... may also work for a large computer corporation developing new software and/or improving older versions of these programs. Programmers write specific programs by breaking down each step into a logical series of hours of writing programs, the programmer must follow. After long hours of writing programs, the programmer must thoroughly testing and revising it. Generally, programmers create software by using the following a basic step-by-step development process: (1) Define the scope of the program by outlining exactly what ... extensively under real-life conditions to see whether it performs correctly(AOL) Programmers are grouped into two types: Application programmers and systems programmers. These programmers write the software that changes a basic machine into a personal tool that not only is useful for increasing productivity but also be fun and entertain the user. Applications programmers write commercial programs to be used by businesses, in scientific research centers, and in the ...
783: Arthur Miller-BIO
... door had always been securely been shut in the past. With the flow of the audience there seemed to be warmth that allowed him to dream and be willing to take that risk in his writing that made him become so famous. He did, however, push the limits when he released his controversial piece Death of a Salesman. And, he gained even more acclaim. Soon he was awarded the Pulitzer Prize ... the true-life dramatic special about the experiences of an all-woman orchestra in a Nazi concentration camp. The show itself received the Emmy for an Outstanding Drama Special and Miller received one for Outstanding Writing. Vanessa Redgrave won as Outstanding Actress, and Jane Alexander, as Outstanding Supporting Actress. In addition to his novels, Miller has written two books of reportage: In Russia and Chinese Encounters, both were accompanied by photographs ... the tone for his writings and then prepared him to stand up in times of tyranny and speak the truth. He used his talent to fight back against what was wrong in his society. His writing was unique in that it appealed to the reader not always from a action or romance level sometimes the reader was simply captivated through the realms of simple logic. This is shown in the ...
784: What Is Witchcraft
... Solitary", means a Witch that worships on his/her own without joining any Coven. Further details about coven will be mentioned in later section. "Charge" is a Magickal act, which saturates a certain object with personal power (Wiccan Definiton). The method that Witches would use to worship the Goddess and the Horned God is called "Ritual". They request and wish through Magick while they perform Rituals. Although each tradition works on ... stage. They think they can communicate with their Gods best in this psychological condition (Wicca: A Guide For The Solitary Practitioner, Cunningham 81). Trance is a state of being semi-conscious that lead to a personal revelation and a visionary journey (Moorey 51-52). Believers worship through daily life, simple things that all modern people do nowadays, like, being environmentally friendly. It is because they think that if the nature suffer ... it according to the Rede, not to harm anybody including him or herself (Alaya). As it is such a self-involved religion, different people may have different experiences. Normally, Witches keep a record of their personal experiences, feelings and some spells that they have composed in a journal called "The Book of Shadows" (Wicca: A Guide For The Solitary Practitioner, Cunningham 196). This book usually passes from generation to generation. ...
785: Shel Silverstein
... me; not much I could do about that. So, I started to draw and write." ( Silverstein,211) From his words it is clear to see how his career began. Due to the way he started writing, almost as a last resort, a desperate reach for a way to express himself, he achieved and learned so much in and from life. Shel was never a big fan of any real literary figures. He learned to make an example of himself. " I was much into my thirties until I really noticed other writers around me, it was probably a good thing." ( Silverstein, 213 ) He went on personal instinct and trust. In his earliest days he wrote as an editorialist for a local press. Those stories consisted mostly of community gossip and leisure activities. Later he moved on to write unique poetry that ... it’s nice to have. He worked very hard to get where he is although he doesn't feel he's anywhere special. He thinks he's exactly the same as everyone else, yet his writing ability is a little more polished than others. He feels that everyone has the talent they just have to find it. And although money is a part of life, he'd rather see a ...
786: For Colored Girls who Have Considered Suicide/ When the Rainbow is Enuf: Style and Theme
... a certain color and begin to follow the specific character wearing that certain color. This is another literary tactic that Shange uses to separate herself from other writers. Shange writes much of her work from personal experience which makes her writing twice as interesting and powerful. She writes several different poems and has them all flow together as one, incredible piece of work. Shange epitomizes the choreopoem style of writing. The theme of Colored Girls is mainly Shange's view of other women of her own race. She writes of dreams that all black women had during her time. Dreams of love and of ...
787: Computer Protection
... safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier ... built up a voice signature and make allowances for an individual's characteristic variations. The theory of voice verification is very simple. It is using the characteristics of a voice: its acoustic strength. To isolate personal characteristics within these fluctuations, the computer breaks the sound into its component frequencies and analyzes how they are distributed. If someone wants to steal some information from your computer, the person needs to have a ... and useful of a computer security system. In 19th century, computer become more and more important and helpful. You can input a large amount of information or data in a small memory chip of a personal computer. The hard disk of a computer system is liked a bank. It contained a lot of costly material. Such as your diary, the financial situation of a trading company or some secret military ...
788: The Holy Bible and Its History
... giving advice concerning the care of particular local churches are called the Pastoral Epistles; 1 and 2 Timothy, Titus. A few scholars think Paul wrote Hebrews, but it is unlikely because of a completely different writing style. It may have been Apollos, Barnabas or Priscilla, or even some other of Paul's co-workers. Following Paul's epistles are the General Epistles and Revelation. James, the older brother of Jesus, wrote an epistle to the Christian Jews who had fled from Jerusalem due to persecution. His letter was written around 45 A.D. making it the earliest writing in the New Testament. Jude, the brother of James and Jesus wrote a brief letter 75 A.D., and John penned the last book, Revelation 90-95 A.D.. (note- it is Revelation, not Revelations ... more like our present books where it had folded pages or sheets of papyrus or vellum (treated animal hide). Obviously there were many advantages to a codex over a scroll. Not one of the original writing (autograph) of any New Testament book still exists. According to most scholars, the closest copy to an autograph is a papyrus manuscript designated P52, which contains a few verses of John 18, from around ...
789: Communication Progresses Between People
... today's hustle and bustle of everyday life, men, women, and children walk past one another without even a friendly smile or hello. As global technology grows, communication between individuals gets more distant and less personal. Even in families, messages are left on the answering machine or as notes on the fridge. Therefore, with todays' highly competitive technological world, it is vital to receive and maintain some old-fashioned inter-personal communication. Communication throughout history progresses from face-to-face to smoke signals, to the Pony Express to Canada Post, to the telephone to telex machines to modems. The fax machine is so impersonal that neither voice nor hand writing are used, and personality is lost. Now a video link where the person can see the caller and feel a personal touch, is trying to re- establish the original methods while using high-tech ...
790: Data Storage Devices
... hard for the 31/2-inch disk. Magnetic storage medium, for all its advantages, only has a life expectancy of twenty years. Data can be stored on electronic medium, such as memory chips. Every modern personal computer utilizes electronic circuits to hold data and instructions. These devices are categorized as RAM (random access memory) or ROM (read-only memory), and are compact, reliable, and efficient. RAM is volatile, and is primarily ... running. ROM is non-volatile, and usually holds the basic instruction sets a computer needs to operate. Electronic medium is susceptible to static electricity damage and has a limited life expectancy, but in the modern personal computer, electronic hardware usually becomes obsolete before it fails. Optical storage medium, on the other hand, will last indefinitely. Optical storage is an increasingly popular method of storing data. Optical disk drives use lasers to read and write to their medium. When writing to an optical disk, a laser creates pits on its surface to represent data. Areas not burned into pits by the laser are called lands. The laser reads back the data on the optical ...


Search results 781 - 790 of 8980 matching essays
< Previous Pages: 74 75 76 77 78 79 80 81 82 83 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved