Cyberspace Essays

140 essay samples found

Adolf Hitler and Responsibility for the Holocaust

Adolf Hitler became leader of Germany in 1933. Adolf was a soldier for Germany in the first world war. Germany lost the war due to betrayal from within. Socialists, communists, and particularly Jews were blamed. Hitler joined a new extreme right wing party, The National Socialists German workers Party. He would inspire people with his […]

Pages: 1 Words: 347 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Holocaust, Information Technology, Internet

The Artistc Realtionship between Man and Smoking

Throughout history, all the way down to the 16th century smoking had always been a prominent stress reliever or pass time to most people. It wasn’t until the 19th century, smoking hit the mass market as cigarette machinery was invented. This led to smoking and cigarettes being an eminent part of the art scene during […]

Pages: 4 Words: 1094 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Smoking
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

The Salem Witch Trials between 1692 and 1693

The Salem Witch Trials occurred in Massachusetts in the colonial era between 1692 and 1693. The cause for these were very debatable. Some theories lead to Rye poisoning from bread to even people faking it. Everyone had a motive, and all just wanted to save himself or herself. This period caused people to be overwhelmingly […]

Pages: 4 Words: 1123 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Salem Witch Trials

About New Imperialism

The White Man’s Burden &Royal Niger Company Contract Lead to New Imperialism The Old versus New Imperialism had changed significantly in a series of various ways; both the White Man’s Burden and Niger Company Contract demonstrated the transition from the Old Imperialism we discussed in our first discussion board. Old Imperialism: Along the time frame […]

Pages: 4 Words: 1168 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Imperialism, Information Technology, Internet

The Bill of Rights and Constitution

On December 15, 1791, the Bill of Rights became part of the Constitution. These amendments were created to protect the rights of the citizens of the United States. The most important rights that were created in the Bill of Rights is the first amendment, it protects a citizen’s freedom of speech and allow them to […]

Pages: 2 Words: 718 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, First Amendment, Information Technology, Internet

Friar Lawrence Quotes in Romeo and Juliet

Romeo and Juliet have a crazy, secretive relationship, that isn’t like most. The Capulets and the Montagues have a long feud between each other. Romeo and Juliet are not allowe to be seen together due to the feud between the Capulets and Montagues. Through the story, the two become very close, and tried to do […]

Pages: 1 Words: 440 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Romeo And Juliet

The First Amendment the Foundation for True Liberty in America

“”The very reason for the First Amendment is to make the people of this country free to think, speak, write and worship as they wish, not as the Government commands.”” (Hugo Black) The First Amendment is indescribably important to the foundation of true liberty in this country. Being the first amendment in the Bill of […]

Pages: 4 Words: 1079 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, First Amendment, Information Technology, Internet

Implications of America S Decision to Put an End to Birthright or Citizenship

America is a country whose constructs were founded by slaves and immigrants during the early stages of industrialization. However, leaders have recently laid great emphasis on closing America’s doors to new migrants, and to deport those who are already within the boundaries of the U.S. For the most part, relinquishing birthright citizenship is unconstitutional under […]

Pages: 3 Words: 819 Topics: Citizenship, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Feminism is for Everybody Themes of Feminism Marriage and Respect Found in a Doll’s House

The late, great Maya Angelou once said, “”You may not control all the events that happen to you, but you can decide not to be reduced by them.”” This idea is one that is clearly embraced my Nora Helmer in Henrik Ibsen’s A Doll House, a dramatic script filled with many heavy themes that leave […]

Pages: 4 Words: 1204 Topics: A Dolls House, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Feminism, Information Technology, Internet

The Reach of Imperialism

Imperialism”a policy of extending a nation’s power and influence over a weaker nation through diplomacy, military force, and economic means. Many countries and lands were dominated due to the abundance of raw materials and markets, lack of democracy and development. Many countries lost their power, freedom, and independence due to imperialism, and it affected them […]

Pages: 3 Words: 827 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Imperialism, Information Technology, Internet

African Imperialism

“Throughout history it has been the inaction of those who could have acted, the indifference of those who should have known better…” – Halie Selassie (Doc. 2). Imperialism began in the early 1880’s when Europe had lost their natural resources due to industrialization. The Europeans traveled to Africa in search of power, as well as […]

Pages: 2 Words: 529 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Imperialism, Information Technology, Internet

Examples of Stereotyping in to Kill a Mockingbird

While racism is the most common form of discrimination in Harper Lee’s To Kill a Mockingbird, there are many more forms of injustices in the book. From the beginning of the book, we read sly remarks about Scout’s blatant tomboyish nature, from her brother Jem. Later, however, we hear the white citizens of Maycomb county […]

Pages: 1 Words: 338 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, To Kill A Mockingbird

Younger’s Family in a Raisin in the Sun

A dream deferred is often assumed to be something tragic, devastating, and that can cause an individual to become hopeless. However, unattainable dreams are chances for replenished and better opportunities. Likewise, in the play A Raisin in the Sun by Lorraine Hansberry, the common misconception that a better opportunity cannot sprout from a dream deferred […]

Pages: 4 Words: 1058 Topics: A Raisin In The Sun, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Internet Censorship in China

An original supporter of internet censorship was Deng Xiaoping, a Chinese politician. Deng Xiaoping had a famous saying that “If you open a window for fresh air for longer than 10 hours, you have to expect some flies to blow in”. Deng Xiaoping, as well as many other Chinese politicians, were the main reason internet […]

Pages: 3 Words: 820 Topics: Censorship, Communication, Cyberspace, Internet, Mass Media, Social Media

Homer’s Epic – the Odyssey

Homer’s epic, The Odyssey, demonstrates many forms of character such as gods, paupers, the rich, and even monsters. The main character that is contrasted amongst the others is Penelope, Odysseus’ wife. During ancient Greek times, women did not play a significant role in society. Whether mortal or immortal, women in The Odyssey are always beneath […]

Pages: 3 Words: 1017 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

Book Report the Iliad and the Odyssey

Many speculations have been made on who is the official author of The Iliad and the Odyssey very little is known about their alleged author though. Most evidence points to Homer a greek poet. Little is known about homer himself due to how long ago in history and the time he lived and when he […]

Pages: 3 Words: 819 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

Positive and Negative Effects of Minimum Wage on People

I. Introduction A. Attention Getter: Imagine this: You’re a single parent working a full-time minimum wage job, or multiple minimum wage jobs, and still are living paycheck to paycheck if you make enough to even provide for your family. Would minimum wage rising make this better? Or would there be a domino effect of higher […]

Pages: 3 Words: 766 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Minimum Wage

How the American Revolution Led to the French Revolution

In the American Revolution, the thirteen colonies were able to gain independence from Great Britain and an important cause of the victory was the help of the French who made a major impact on the war and were allies of the colonists. They fought together closely and exchanged several ideas, which included thinking that led […]

Pages: 4 Words: 1196 Topics: American Revolution, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Penicillin during World War II

Humans and bacteria have co-existed for thousands of years. Many people have fallen to bacterial infections secondary to penetrating wounds or from being in proximity to those who are sick. Since ancient times, people have used honey, wine or vinegar on wound dressings, and used heavy metals such as silver or copper for vases to […]

Pages: 4 Words: 1180 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, World War 2

Why is Abigail to Blame in the Crucible

In the play, The Crucible, by Arthur Miller, the author argues/ implies that people can be easily manipulated by fear. The character, Abigail has many faults. In this paper I will explain if Abigail deserved the blame for the outcome. I will also support my argument with evidence from the play. Abigail has so many […]

Pages: 2 Words: 630 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Protagonist in to Kill a Mockingbird

The protagonist is Jean Louise (a.k.a Scout.) She is the narrator of the story. Scout is 6 to 9 years old in this story. She is a white girl in the middle of racist times during the Great Depression. Because of this, her family is poor but is still more valued than others. Scout’s appearance […]

Pages: 1 Words: 364 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, To Kill A Mockingbird

Differences between the Crucible Movie and the Play

The famous play The Crucible by Arthur Miller and the movie The Crucible may share the same name but have many differences, whether it’s the characters and how they act, or the way the scene changes, or in this example how the completely focus the story on something else. There was many additional scenes, or […]

Pages: 2 Words: 578 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Neuroscience of Addictions – Brain Chemistry in Action

Prescription stimulants belong to schedule II drugs as per Drug Enforcement Administration (DEA) classification. They are highly abused for they are easily accessible. The effect of this is the emergence of substance abuse disorder. Drug abuse denotes using prescription stimulants or any other drug for other reasons other than the intended one. Non-medical use of […]

Pages: 1 Words: 345 Topics: Addiction, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Drug, Information Technology, Internet

About Witchcraft in the Crucible

The Crucible is mainly about witchcraft. Witchcraft is the practice of magic, especially black magic. With this magic you can use spells and the innovation of spirits. People have gone insane believing that witchcraft is happening in their town. People start accusing others for witchcraft and once that is said, your life’s on the line. […]

Pages: 2 Words: 628 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Event that Sparked Personal Growth

One of the major events that sparked a period of personal growth and improved my understanding of myself and those around me related to an instance when my best friend Jones became diagnosed with a rare kidney condition. Having known him since we were five years old, we have spent a lot of time together […]

Pages: 1 Words: 328 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Personal

The Relationship between George and Lenni

Throughout the novel, the relationship between George and Lennie has been seen as unusual to others because the people on the ranch usually live in alienation from one another. Steinbeck suggests that it is difficult to trust others when undergoing obstacles, however with a companion one can go through hardships and challenges. Friendship and obligations […]

Pages: 2 Words: 540 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Of Mice And Men

Occured in Civil War

Out of everything that occured in Civil War, we wonder what started it all. Three things that really interfered were slavery, the president election, and the senate’s. Before the war started North and South had many disagreements and slavery was a big one. The North felt that all races should be treated the same, but […]

Pages: 2 Words: 648 Topics: Civil War, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

The War for Freedom

The War for Freedom In 1861, the nations most deadly war began. To make it worse, the enemy we fought was ourselves. This was known as the Civil War. The Civil War was caused due to rising tensions between the northerners and the southerners. The rising tensions caused America to clash with itself. One of […]

Pages: 4 Words: 1112 Topics: Civil War, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

The United States was a Divided Country

The United States was a divided country during the nineteenth century. The North wanted to abolish slavery, while the South was completely convinced that they would not be able to survive without it. This was an issue that could not be resolved on its own, and it was so controversial that it resulted in a […]

Pages: 3 Words: 980 Topics: Civil War, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Followed the Civil War

In the decades that followed the Civil War, political policies did not promote diversity and the melting pot despite strong prejudices of a few. That is because according to the1 1890 report by the United States census bureau, there were approximately 6,337,980 negroes, 956,989 mulattoes, 105,135 quadroons, and 69,936 octoroons. Furthermore, the white race had […]

Pages: 2 Words: 743 Topics: Civil War, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet
1 2 3 4 5