SEARCH RESULTS

YOU WERE LOOKING FOR :Computers and Buddhism

Essays 271 - 300

Zen Buddhism Term Satori and its Meaning

In one page this research paper defines the Zen Buddhist concept satori as heightened enlightenment comprehension. One source is ...

Comparative Analysis of Buddhism and Native American Beliefs

In nine pages a comparative analysis of Native American and Buddhist beliefs considers their similarities and differences. Six so...

Personality, Five Aggregates, and Buddhism

In two pages the five aggregates are interpreted and applied to the Buddhist daily life, with this representing the 3rd in a four ...

Hinduism, Buddhism, Islam, Judaism, and Christianity

In five pages these five religions are explained in terms of their community and individual influence and then contrasted and comp...

Comparative Analysis of Christianity, Buddhism, and Hinduism

meaning of Hinduism as it has been expressed during the twentieth century (1978). Buddhism embraces similar concepts as Hi...

AComparison of Religions Taoism, Native American, Confucianism, Hinduism, Buddhism, and Jainism

however, which is present in all Native American Religions. That element is the integral tie between Native American spirituality...

Monk's Life and Buddhism Principles

to a greater spiritual reality (Fowler 252). Buddha taught that human life involved suffering, and that this suffering could only ...

Buddhism and Hinduism

Theravada Buddhism was the original form, which was based on lengthy meditation and required...

Pornography, Hinduism, Buddhism, Judaism, and Christianity

was the reaction of Europeans to many aspects of Eastern culture when they first encountered it. However, Parrinder indicates that...

Pilgrimages in Buddhism and Islam

that the political, social and revolutionary benefits of Hajj have been overtaken by mass production of ritual mismanagement" (Hae...

Evaluating Two Buddhism Texts

or Ego" (Rahula, 1986, p. 23). Conze s (1959) Buddhist Scriptures is another book that is rather comprehensive as well. Conze is ...

Jainism, Buddhism, and Hinduism

the quest for atman , the knowledge of the self" emerged (Hinduism History, 2005). This took place between 400 B.C. and 600 A.D. (...

Buddhism and Its Teachings: Effective or Ineffective?

old age, death, and finally, a monk "who had given up everything he owned to seek an end to suffering" ("Following the Buddhas Foo...

Forecasting for a Fast Food Outlet

and ice creams sold in the summer, this looks at the trends rather than just the past performance. Regression analysis takes th...

A Comparison of Sex as Embraced in Christianity and Buddhism

Yet, this movement includes many who are in a minority. Today, regardless of religion, sex is everywhere. This was not always the ...

Comparing Christianity and Buddhism

of the Divine somewhat differently than do Christians, as while they believe in a variety of "celestial realms," which includes be...

Korean Development and the Influences of Shamanism, Confucianism, and Buddhism

peace within these kingdoms, which battled constantly for regional dominance (Hawkins 57). In 668 AD, Silla emerged victorious, a...

The Shaping of Buddhism and Jainism

Eastern religions share numerous similarities but there are also many contrasts....

How My Life Was Changed by Buddhism

because of the construct of human nature, and the constant conflict caused by physical needs, sexual urges, and the desires for lo...

Buddhism, Western Culture, Consumerism And Disharmony

notes how this continual desire to control keeps people anxious and powerless to their own misery, which is exactly why so many pe...

Free Will and Determinism in Buddhism

one may see it as quasi-scientific determinism. Yet, from a Western point of view, Buddhism is considered to be indeterministic (A...

Differences Between Theravada and Mahayana Buddhism

18). The words of Buddha were not written down until several centuries after his death and the first divisions within Buddhist b...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

High-Tech Crime: How The Criminal Justice System Has Had To Change Its Approach

equipped to penetrate any computer system with the intent to take, destroy or manipulate the information found upon that system; i...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

System Development Life Cycle: Compare/Contrast

a specific definition and set of goals for the project" (Ntuen, 1991, p. 33). II. SYSTEM DEVELOPMENT LIFE CYCLE MODELS Ever sinc...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...

Don Tapscott's Promise and Peril in the Age of Networked Intelligence

The 'digital economy' is the focus of this paper consisting of five pages with computer networking's advantages viewed within the ...

Computer Espionage and Emergencies of National Security

In five pages this paper examines the computer espionage threats to national security and technology being developed to eliminate ...

Home Businesses and Computer Generated Changes

In a paper consisting of five pages home businesses are examined in terms of the changes brought about by computers. Eight source...