Literature crime prevention Essays

Filter filter
Sort by filter
27 essay samples found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

The Outsiders: Ponyboy Curtis Character

The main character of The Outsiders is Ponyboy Curtis. He is 14 years old who lives with his two brothers, Sodapop Curtis and Darry Curtis. His parents sadly died before this book was written, and so he lives with his oldest brother, Darry, who is 20 years old and also Sodapop Curtis. Ponyboy has greenish-gray […]

Pages: 3 Words: 814 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Outsiders

Book Report the Iliad and the Odyssey

Many speculations have been made on who is the official author of The Iliad and the Odyssey very little is known about their alleged author though. Most evidence points to Homer a greek poet. Little is known about homer himself due to how long ago in history and the time he lived and when he […]

Pages: 3 Words: 819 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

History of the Fireman in Fahrenheit 451

The book is shown in third-person through Guy Montag, a fireman. But, in the story, firemen do not put out fires, since every house is fireproof. Instead, they cause them, burning books and the houses of the people who own them. Montag is walking home one night when he meets Clarisse, a young girl who […]

Pages: 3 Words: 834 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Fahrenheit 451, Information Technology, Internet

Events Experienced by Odysseus

The Odyssey is a well-known poem written by a Greek writer Homer and is considered as one of the most ancient masterpieces of literature. The story of the poem takes place when Odysseus, the brave and strategic warrior fought in the Trojan War in Troy for ten years in Ancient Greece. While away, Odysseus faced […]

Pages: 7 Words: 2017 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

Friar Lawrence Takes Romeo and Juliet S Life

Romeo and Juliet have a crazy, secretive relationship, that isn’t like most. The Capulets and the Montagues have a long feud between each other. Romeo and Juliet are not allowe to be seen together due to the feud between the Capulets and Montagues. Through the story, the two become very close, and tried to do […]

Pages: 1 Words: 440 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Romeo And Juliet

Hunger Games Book Vs. the Movie (MLA)

Have you ever watched the Hunger Games movie and read the Hunger Games book? Did you notice the peripheral differences interpolated between them? Well, if you have then you certainly see that the cinema and the novel’s plots are proportionally similar, but there are a few alterations between the movie and the book. Supposing they […]

Pages: 3 Words: 957 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Hunger Games

About the Odyssey by Homer

The Odyssey by Homer, an old epic written masterpiece, that depicts several themes and surprises we as readers encountered while reading it. Few major themes that will be discussed would be first off, the role of females in the odyssey and then proceed with other aspects of the book, among are power, revenge, family, how […]

Pages: 7 Words: 2019 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

The Crucible is an Sllegory of the Red Scare

Section I: Introduction Arthur Miller’s, The Crucible, is an allegory of the Red Scare that impacted society mentally, physically, and spiritually. The play displayed a series of abnormal occurrences that followed a similar social and political fallout that was seen prior in the seventeenth century. It was also a means to represent the ridiculous and […]

Pages: 7 Words: 1961 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

The Crucible as an Allegory of the Witch Trial

With more than 200 people accused and 20 people executed, the Salem Witch trials became a serious case that lasted throughout history inspiring authors like Arthur Miller to write a play based on this issue. Miller wrote, The Crucible as an allegory of the Witch Trials to compensate for the problems that he faced during […]

Pages: 5 Words: 1419 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Conveying Sentiments to the Reader in Hamlet

In the play, Hamlet, by William Shakespeare, the author uses various literary devices to convey many themes and sentiments to the reader, via his characters’ actions. The play’s focal character – Hamlet – is one that transforms throughout the play quite drastically, yet it can be argued that it was all part of a greater […]

Pages: 5 Words: 1547 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Hamlet, Information Technology, Internet

How Uncle Tom’s Cabin Influenced America

“I won’t be taken Eliza; I’ll die first! I’ll be free, or I’ll die! (George 36). With the intention of awakening sympathy for the oppressed slaves, Uncle Tom’s Cabin by Harriet Beecher Stowe, has played a significant role on not just Americans, but as well as the generations to come, since it became published in […]

Pages: 4 Words: 1216 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Uncle Toms Cabin

Lies, Revenge and Betrayal in Othello

Lies are extremely common in our society today, with millions of people masking their true intentions. In Shakespeare’s play titled Othello, one of the characters, Iago, is no different and in fact the same as those deceptive individuals in society. Behind his act as a trustworthy friend, Iago is a manipulative and deceptive character creating […]

Pages: 4 Words: 1118 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Othello

Feminism is for Everybody Themes of Feminism Marriage and Respect Found in a Doll’s House

The late, great Maya Angelou once said, “”You may not control all the events that happen to you, but you can decide not to be reduced by them.”” This idea is one that is clearly embraced my Nora Helmer in Henrik Ibsen’s A Doll House, a dramatic script filled with many heavy themes that leave […]

Pages: 4 Words: 1204 Topics: A Dolls House, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Feminism, Information Technology, Internet

Younger’s Family in a Raisin in the Sun

A dream deferred is often assumed to be something tragic, devastating, and that can cause an individual to become hopeless. However, unattainable dreams are chances for replenished and better opportunities. Likewise, in the play A Raisin in the Sun by Lorraine Hansberry, the common misconception that a better opportunity cannot sprout from a dream deferred […]

Pages: 4 Words: 1058 Topics: A Raisin In The Sun, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Homer’s Epic – the Odyssey

Homer’s epic, The Odyssey, demonstrates many forms of character such as gods, paupers, the rich, and even monsters. The main character that is contrasted amongst the others is Penelope, Odysseus’ wife. During ancient Greek times, women did not play a significant role in society. Whether mortal or immortal, women in The Odyssey are always beneath […]

Pages: 3 Words: 1017 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

Abigail in the Play “The Crucible”

In the play, The Crucible, by Arthur Miller, the author argues/ implies that people can be easily manipulated by fear. The character, Abigail has many faults. In this paper I will explain if Abigail deserved the blame for the outcome. I will also support my argument with evidence from the play. Abigail has so many […]

Pages: 2 Words: 630 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Stereotypes in to Kill a Mockingbird

While racism is the most common form of discrimination in Harper Lee’s To Kill a Mockingbird, there are many more forms of injustices in the book. From the beginning of the book, we read sly remarks about Scout’s blatant tomboyish nature, from her brother Jem. Later, however, we hear the white citizens of Maycomb county […]

Pages: 1 Words: 339 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, To Kill A Mockingbird

Differences between the Crucible Movie and the Play

The famous play The Crucible by Arthur Miller and the movie The Crucible may share the same name but have many differences, whether it’s the characters and how they act, or the way the scene changes, or in this example how the completely focus the story on something else. There was many additional scenes, or […]

Pages: 2 Words: 578 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Protagonist in to Kill a Mockingbird

The protagonist is Jean Louise (a.k.a Scout.) She is the narrator of the story. Scout is 6 to 9 years old in this story. She is a white girl in the middle of racist times during the Great Depression. Because of this, her family is poor but is still more valued than others. Scout’s appearance […]

Pages: 1 Words: 364 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, To Kill A Mockingbird

About Witchcraft in the Crucible

The Crucible is mainly about witchcraft. Witchcraft is the practice of magic, especially black magic. With this magic you can use spells and the innovation of spirits. People have gone insane believing that witchcraft is happening in their town. People start accusing others for witchcraft and once that is said, your life’s on the line. […]

Pages: 2 Words: 628 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Event that Sparked Personal Growth

One of the major events that sparked a period of personal growth and improved my understanding of myself and those around me related to an instance when my best friend Jones became diagnosed with a rare kidney condition. Having known him since we were five years old, we have spent a lot of time together […]

Pages: 1 Words: 328 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Personal

The Relationship between George and Lenni

Throughout the novel, the relationship between George and Lennie has been seen as unusual to others because the people on the ranch usually live in alienation from one another. Steinbeck suggests that it is difficult to trust others when undergoing obstacles, however with a companion one can go through hardships and challenges. Friendship and obligations […]

Pages: 2 Words: 540 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Of Mice And Men

The Role of Science in Frankenstein

Mary Shelley tells a story of a scientist who creates a hideous creature in the novel Frankenstein. Victor Frankenstein is an amazing, smart scientist who admired human anatomy, and soon decided to create his own creature. Who is more at fault for the monsters behavior, Victor or the monster? If you were in the monsters […]

Pages: 3 Words: 755 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Frankenstein, Information Technology, Internet

Lord of the Flies and World War II

It is a man’s own mind, not his enemy or foe, that lures him to evil ways -Buddha. William Golding’s novel, Lord of the Flies provides multiple examples of historical allusion to reflect the events of World War II and enhance the meaning of the public’s concerns about the conflict between democracy and communism. Throughout […]

Pages: 3 Words: 791 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Lord Of The Flies

The Power of Romeo and Juliet’s Love

Shakespeare depicts in the play, Romeo and Juliet, that love can manipulate and control a person to perform acts they would not otherwise do. The power of love can go beyond the chemistry between two lovers, by affecting the love between parents and child, and even act as a force between two people. This type […]

Pages: 4 Words: 1067 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Romeo And Juliet

About Feminism in Hamlet

Ophelia agrees to take Laertes’s advice. She agrees to take his advice because she knows nothing else than to listen a man. She is dependent on men and continues to do whatever they tell her. She saids “this is a good lesson keep, As a watchman to my heart.” (1.3.51) She sees it as he […]

Pages: 3 Words: 769 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Feminism, Hamlet, Information Technology, Internet

Elements of Comedy in the Play Hamlet

Hamlet is one of Shakespeare’s’ most famous plays, for it revolves around external and internal conflicts or struggles within the main character, Hamlet, which makes it unique from a typical revenge story. Although the genre of the play is a tragedy it contains various elements of comedy throughout the darkest moments of the play. At […]

Pages: 2 Words: 655 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Hamlet, Information Technology, Internet
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price