Computer networking Essays

125 essay samples found

To what Extent was Greece Affected by the EU after World War II

The downfall of Greece had begun before the country itself knew it would exist. During World War II, the Greeks had to combat against the Albanians, Italians, Bulgarians and Germans. As a whole, in battling these four countries, around 85,000 Greeks were killed. In an excerpt from a speech to Reichstag on May 4, 1941 […]

Pages: 5 Words: 1559 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, World War 2

The World Growing a World War II Remembrance

When Adolf Hitler invaded Poland on September 1,1939, it would be the start of a cruel, bloody, miserable, and long war for the World. It would come with pain, loss of innocent lives, betrayal, torture, instability, attack, and pure hatred between forces. When France and Britain declared War on Germany, it would be the beginning […]

Pages: 5 Words: 1422 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, World War 2
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

The Crucible is an Sllegory of the Red Scare

Section I: Introduction Arthur Miller’s, The Crucible, is an allegory of the Red Scare that impacted society mentally, physically, and spiritually. The play displayed a series of abnormal occurrences that followed a similar social and political fallout that was seen prior in the seventeenth century. It was also a means to represent the ridiculous and […]

Pages: 7 Words: 1957 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

The Crucible as an Allegory of the Witch Trial

With more than 200 people accused and 20 people executed, the Salem Witch trials became a serious case that lasted throughout history inspiring authors like Arthur Miller to write a play based on this issue. Miller wrote, The Crucible as an allegory of the Witch Trials to compensate for the problems that he faced during […]

Pages: 5 Words: 1419 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Why did the Brexit Vote Happen?

What caused voters to leave even though it was warned to be economically disadvantageous? The Brexit vote which occured in March of 2016 shocked all of Europe as it was the first time a nation had decided to leave the European Union. The decision of Great Britain to exit the European Union has had widespread […]

Pages: 4 Words: 1052 Topics: Brexit, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Pre-Industrial Revolution

Pre- Industrial Revolution Prior to the Industrial Revolution the way most people lived in Europe was very different to how they lived post the Industrial Revolution. 9 out of 10 people lived in rural areas, there was a large mostly poor lower class, a small rich upper class and not much of a middle class. […]

Pages: 4 Words: 1314 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Industrial Revolution, Information Technology, Internet

In Physical Abuse

Child abuse has both short and long term effects on each child. In fact, due to these effects on each child it makes it really hard for society to understand these effects and how to deal with it on a daily basis. Child abuse is considered any act of authority or careless exposure to a […]

Pages: 5 Words: 1622 Topics: Child Abuse, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Gap between Health Care and Child Abuse

Disparity: The Gap between Health Care and Child Abuse The disparity gap between health care and child abuse has the potential to impact a professional’s life in an emotional way. Besides legal practices and the training undergone to protect a child from child abuse, professionals have gone through previous studies that have determined the emotional […]

Pages: 6 Words: 1693 Topics: Child Abuse, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Child Abuse has been a Major Problem

Child abuse has been a major problem for a long time and most people are completely unaware of this act. This act affects many children and no one really knows what goes on behind closed doors with parents and their child. This is scary to think about, but this is reality and children are put […]

Pages: 5 Words: 1536 Topics: Child Abuse, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

The Theme of the Holocaust and the Responsibility

When we see an image in black and white, we tend to believe that such an event only occurred in a history textbook years ago. We think of wars, death, power, the absence of life, and aggression. An image in black and white can create a nostalgic mood or a hopeless feeling like the Holocaust […]

Pages: 8 Words: 2519 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Holocaust, Information Technology, Internet

Adolf Hitler’s Life

Adolf Hitler, born in Braunau am Inn, Austria, on April 20, 1889, has an interesting history to say the least. He had five siblings and was born to Alois Hitler and Klara Polzl. His father was an emotionally harsh man and didn’t accept Adolf’s career choice in fine arts later on in his life. He […]

Pages: 3 Words: 869 Topics: Adolf Hitler, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Is Holocaust Denial Real?

The Holocaust was the killing and persecution of over six million Jews and other groups such as the disabled, Gypsies, Slavics, homosexuals, and Jehovah’s Witnesses. The Holocaust was performed and executed by the Nazis in the 1930s and 1940s. Although there is overwhelming evidence of the existence of the Holocaust, people still deny that the […]

Pages: 6 Words: 1762 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Holocaust, Information Technology, Internet

The Effects of Domestic Violence: Family & Society

Unspoken, destructive, and hidden from the outside world. Domestic violence. In grade school it is rarely talked about. October is Domestic Violence awareness month, yet no one said a word. In order to prevent this, we must first understand it. What is domestic violence? It is a pattern of controlling and manipulating behavior that is […]

Pages: 8 Words: 2351 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Domestic Violence, Information Technology, Internet

Spousal Abuse and Domestic Violence

Domestic violence or violence between intimate partners, results in the deaths of approximately four women every day and accounts for thirty-one percent of female homicides in the United States. (Mills). For a long time, domestic violence was looked at as a private and personal matter that didn’t necessarily call for police and prosecution concern. In […]

Pages: 8 Words: 2282 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Domestic Violence, Information Technology, Internet

How US Intervention in Afghanistan during the Cold War Led to the Global War on Terror

During the Cold War in the late 1970s the Soviet Union invaded Afghanistan. At the time, tensions between the Soviet Union and the US were high, and so the US was trying to combat the Soviet influence without direct military action that may result in a war between the two nuclear armed countries. The US […]

Pages: 6 Words: 1686 Topics: Cold War, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Gender Roles: Attitudes and Behavior

Over the years gender roles have had specific definitions created by society. Gender roles determine how males and females should think, speak, and dress. Also, gender roles can be defined as the behaviors and attitudes expected of male and female members of a society by that society. Gender roles are already developed before you are […]

Pages: 6 Words: 1946 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Gender Roles, Information Technology, Internet

Effect of Rural-Urban Migation on the Poverty Status of Farming Households in Ogbomoso

CHAPTER ONE INTRODUCTION 1.1 Background of the study Needless to say that poverty is a global problem; however the menace of poverty is most devastating in the developing countries of the world. Food production has hardly kept pace with population size and the quantity as well as quality of health has also massively deteriorated. According […]

Pages: 16 Words: 4834 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Poverty

Youth Homelessness in the United States

Imagine having to live on the streets, in unbearable conditions, never knowing what it is like to be in a stable environment. This presents many challenges faced by children as young as a few months old. These challenges are faced by some of the more than 500,000 children (Bass 2017). These children do not have […]

Pages: 7 Words: 2117 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Homelessness, Information Technology, Internet

Police Abuse of Power

Police brutality refers to systematic misuse of authority and powers through the unwarranted infliction of bodily or psychological pain to civilians by law enforcers during their official duties. The routine enforcement of law using excessive force against unarmed civilians and the correctional misuse of facilities to manipulate, inflict, injure or subject a civilian to torture […]

Pages: 9 Words: 2644 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Police Brutality

Stop Police Brutality against Minority’s

Police abuse remains one of the most serious human rights violations in the United States. Over the past decades, police have acted out in ways that have made people wonder, are our officer really doing their jobs?. Unjustified shootings have contributed to the ever present problem of police brutality in America. In the late 19th […]

Pages: 7 Words: 2062 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Police Brutality

The Understanding of Politics by Aristotle and Thomas Hobbes

Aristotle and Thomas Hobbes, two philosophers from different time period, were very famous about the way they were approaching differently their ideologies about politics. Both of them had different points of view about the political communities, the power of the state and the role that every human being have in the society. To talk about […]

Pages: 3 Words: 788 Topics: Aristotle, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

The Historical Work Salem Story

The Salem Witch Trials of 1962 was one of the most scandalous historical events in American history. A brief history of the Salem witch trials is that more than 200 people were accused of practicing witchcraft and about 20 people were executed. In an article it said that “The Salem Witch Trials began in January […]

Pages: 2 Words: 474 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Salem Witch Trials

The Life of Albert Einstein

Albert Einstein was a German American scientist that is thought to be one of the greatest minds ever. He is best known for his theories on relativity and theories of matter and heat. Einstein is considered one of the greatest physicists of all time because he is thought to have changed the way someone looks […]

Pages: 4 Words: 1200 Topics: Albert Einstein, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Unintentional Racism: Contemporary Perspectives

The focus of research is on how students view criticizing by their school staff. Most of the criticizing issues happen unintentionally: when the teacher or professor stereotype students by their color or their origins. If you were white, you are always expected to be smart and have the knowledge, but if the student were black […]

Pages: 7 Words: 2034 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Racism

American Rule in the Philippines and Racism

During our almost 50 years of control in the Philippines, many of our law makers and leaders were fueled by debates at home, and also our presence overseas. These two perspectives gave a lot of controversy as to how Americans were taking control, and confusion of what they were actually doing in the Philippines. Many […]

Pages: 6 Words: 1903 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Racism

The Outsiders: Ponyboy Curtis Character

The main character of The Outsiders is Ponyboy Curtis. He is 14 years old who lives with his two brothers, Sodapop Curtis and Darry Curtis. His parents sadly died before this book was written, and so he lives with his oldest brother, Darry, who is 20 years old and also Sodapop Curtis. Ponyboy has greenish-gray […]

Pages: 3 Words: 814 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Outsiders

Minimum Wage and Prices

The price control set by the government which is related to wages for work is called minimum wage. The current federal minimum wage is $7.25 per hour, but some states had passed laws that increased the amount. People should also be aware that minimum wage does not guarantee jobs. In fact, it only guarantees that […]

Pages: 2 Words: 465 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Minimum Wage

Hunger Games Book Vs. the Movie (MLA)

Have you ever watched the Hunger Games movie and read the Hunger Games book? Did you notice the peripheral differences interpolated between them? Well, if you have then you certainly see that the cinema and the novel’s plots are proportionally similar, but there are a few alterations between the movie and the book. Supposing they […]

Pages: 3 Words: 957 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Hunger Games

Criminal Law & Procedure

Abstract While the criminal justice system as a whole is important, the court system plays a large role after a complaint and lawful arrest. The process includes, but not limited to: arraignment, discovery, plea bargaining, trial, and sentencing. An arraignment is the defendant’s first court appearance. An arraignment is also known as first appearance and […]

Pages: 7 Words: 2196 Topics: Computer Networking, Computer Security, Crime Prevention, Criminal Justice, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

The Criminal Justice System in the United States

Within the past several years, it has become almost impossible to open a news app, log on to a news website or turn on the television without hearing about the judicial system. With news about recent arrests, prison sentences, court hearings, or investigations becoming common in recent years. The judicial system plays a large part […]

Pages: 6 Words: 1689 Topics: Computer Networking, Computer Security, Crime Prevention, Criminal Justice, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet
1 2 3 4 5