SEARCH RESULTS

YOU WERE LOOKING FOR :Computer History and Their Impact on Society

Essays 31 - 60

1845 to 1865 History of U.S. Railroads

state. While Stevens failed to raise enough money to build his proposed railroad, he still desired to apply steam locomotion to ra...

World Trade and Chile

In seven pages this research paper considers the history, economy, and society of Chile with the emphasis upon economic growth, th...

Contemporary Slavery/Impact of Slavery in U.S.

most commonly found form of modern slavery. In this form, individuals agree to use their capacity to perform work as a collateral ...

The Flea in History

interestingly enough to mean "wingless siphon" (Kettle, 1995). The flea is a highly specialized creature and subsists by sucking ...

AN ANALYSIS OF THE ARYAN BROTHERHOOD

others must be destroyed, no matter the means (Holthouse, 2005). History Like many racially oriented organized crime group...

Questions and Answers on Early Nineteenth Century English History (1800-1840)

resulted in a huge public outcry against the King. Reformers and radicals alike encouraged dialogue regarding gender oppression a...

The Naked Society by Vance Packard

in many different ways, invading privacy and pushing their way into our lives. While many people accept it today, the pressures in...

Human Psychology in William Faulkner's Sanctuary and Nathaniel Hawthorne's The Scarlet Letter

In three pages this paper examines the primary characters in these two stories in terms of society's treatment of them and human p...

Ayn Rand's Anthem, Regression, and Collectivist Society

The needs of the society come before the needs of the individual, and Rand even suggests that this collective identity would suppo...

Hindu Society and Women's Roles

are not to be allowed any form of independence - they cannot even undertake religious fasts on their own initiative, but must join...

Society and Natural Gender Roles

the natural world held many different dangers for communities or societies. With warfare men naturally went off to fight and women...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

The Physiological, Psychological, and Social Impacts of Methamphetamine

demand because it is cheap and easily available. It is cheap and easily available because it is so easy to manufacture. Methamph...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Jonathan Swift/Gulliver's Voyage to Lilliput

is ale to jump "the highest," succeeding to high office (Swift). As this suggests, Swift was lampooning the machinations require...

American Society and Racism

in his introduction, "One of the paradoxes of a culture of fear is that serious problems remain widely ignored even though they gi...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Nursing Honor Society Sigma Theta Tau International

It also publishes the Journal of Nursing Scholarship, Reflections on Nursing Leadership and an online newsletter, Excellence. ...

Rise and Fall of of the Qin Dynasty

considered to be "xian" or districts, but larger administrative districts were later formed. These were the "jun" or provinces (Qi...

More Than One History in the American Revolution

Histories in recent years have sought to go beyond the classical interpretations that have been presented in the past. This essay ...

French Canadians at the End of the 19th Century

"the aspirations of the people themselves. The controlling idea of the French Canadian is to retain...