Digital technology Essays

Filter filter
Sort by filter
134 essay samples found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

Professional Goal Statement

Being A critical care nurse practitioner, I will be a medical specialist who deals with treatment of patients with short-lived but severe episodes of illness, damage as a result of injuries, heart problems like heart attack and respiratory difficulties. Acute care mainly consists of emergency medical interventions carried out in health centres. As an acute […]

Pages: 2 Words: 560 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Professional

Event that Sparked Personal Growth

One of the major events that sparked a period of personal growth and improved my understanding of myself and those around me related to an instance when my best friend Jones became diagnosed with a rare kidney condition. Having known him since we were five years old, we have spent a lot of time together […]

Pages: 1 Words: 328 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Personal
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

Prevalence of Decubitus UlcerIncidence and Prevalence of Decubitus Ulcer in American Hospitals is on the Rise

This makes decubitus ulcer a serious concern for nurses.Cases of decubitus ulcer among patients are becoming common in hospitals across the planet with numerous cases reported by the World Health Organization. The prevalence of this condition ranges from 3% to 50% in the services of Intensive Care (ICU), Internal Medicine and Neurology.? In addition, their presence […]

Pages: 6 Words: 1715 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Health Care, Information Technology, Internet

Significance of Lewis and Clark Lake to the American History Working

Thesis:Lewis and Clark Lake holds numerous types of fish that display different characteristics and therefore the lake forms a vital part of the American History. This article explores the topic of percid fishes which are freshwater derivatives of marine perciform. The fishes have undergone tremendous radiation and hence they comprise of 151 species available in […]

Pages: 4 Words: 1329 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Marxism and Malthusian Theories

Introduction The problem to the issue of giving out socialist ideas is the perception that poverty is something natural to human beings. It is usually caused as a result of rapid growth in population that surpasses the amount of food produced. This was basically what was stipulated by Thomas Malthus in his publication titled the […]

Pages: 4 Words: 1268 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Marxism, Theory

Importance of Teamwork in Healthcare

Introduction The ability of more than one person to interact professionally with a common goal of improving service delivery to patients is essential in achieving the objective of increasing patient satisfaction at places of work. The study indicates that the ability of healthcare professionals to work as a unit is a key component to better […]

Pages: 2 Words: 551 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Health, Information Technology, Internet

Neuroscience of Addictions – Brain Chemistry in Action

Prescription stimulants belong to schedule II drugs as per Drug Enforcement Administration (DEA) classification. They are highly abused for they are easily accessible. The effect of this is the emergence of substance abuse disorder. Drug abuse denotes using prescription stimulants or any other drug for other reasons other than the intended one. Non-medical use of […]

Pages: 1 Words: 345 Topics: Addiction, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Drug, Information Technology, Internet

How are Organizations Influenced Today by the Civil Rights Era then and Now

“The minute we look away, the minute we stop fighting back, that’s the minute bigotry wins” (DaShanne Stokes). Blacks and whites in America see racism and disparities in the United States very differently. How we view race, racism, inequality, and the justice system depends a lot on our background. The things that are occurring in […]

Pages: 3 Words: 958 Topics: Civil Rights Movement, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

The Current Trends and Issues of Social Media and its Effects on the Criminal Justice System

Technology keeps changing and getting more and more in everybody’s face we can’t avoid it. With that being said the more it advances and what if has become from say 50 years ago takes a big effect on the criminal justice system in many ways. Now there are good and bad ways it affects it. […]

Pages: 2 Words: 681 Topics: Computer Networking, Computer Security, Crime Prevention, Criminal Justice, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Careers in Criminal Justice

Education and Professional Law Enforcement The American police officer execrate a promise to defend and aid the people they embody. They are presented by the administration to implement the law by detaining offenders and sensing and averting misconducts. Germann (1967) commences by stating that “there was a time when the American policeman would be inclined […]

Pages: 3 Words: 902 Topics: Computer Networking, Computer Security, Crime Prevention, Criminal Justice, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

The Criminal Justice System in the United States

Within the past several years, it has become almost impossible to open a news app, log on to a news website or turn on the television without hearing about the judicial system. With news about recent arrests, prison sentences, court hearings, or investigations becoming common in recent years. The judicial system plays a large part […]

Pages: 6 Words: 1689 Topics: Computer Networking, Computer Security, Crime Prevention, Criminal Justice, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Criminal Law & Procedure

Abstract While the criminal justice system as a whole is important, the court system plays a large role after a complaint and lawful arrest. The process includes, but not limited to: arraignment, discovery, plea bargaining, trial, and sentencing. An arraignment is the defendant’s first court appearance. An arraignment is also known as first appearance and […]

Pages: 7 Words: 2196 Topics: Computer Networking, Computer Security, Crime Prevention, Criminal Justice, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

American Rule in the Philippines and Racism

During our almost 50 years of control in the Philippines, many of our law makers and leaders were fueled by debates at home, and also our presence overseas. These two perspectives gave a lot of controversy as to how Americans were taking control, and confusion of what they were actually doing in the Philippines. Many […]

Pages: 6 Words: 1903 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Racism

Unintentional Racism: Contemporary Perspectives

The focus of research is on how students view criticizing by their school staff. Most of the criticizing issues happen unintentionally: when the teacher or professor stereotype students by their color or their origins. If you were white, you are always expected to be smart and have the knowledge, but if the student were black […]

Pages: 7 Words: 2034 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Racism

Protagonist in to Kill a Mockingbird

The protagonist is Jean Louise (a.k.a Scout.) She is the narrator of the story. Scout is 6 to 9 years old in this story. She is a white girl in the middle of racist times during the Great Depression. Because of this, her family is poor but is still more valued than others. Scout’s appearance […]

Pages: 1 Words: 364 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, To Kill A Mockingbird

Stereotypes in to Kill a Mockingbird

While racism is the most common form of discrimination in Harper Lee’s To Kill a Mockingbird, there are many more forms of injustices in the book. From the beginning of the book, we read sly remarks about Scout’s blatant tomboyish nature, from her brother Jem. Later, however, we hear the white citizens of Maycomb county […]

Pages: 1 Words: 339 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, To Kill A Mockingbird

Stop Police Brutality against Minority’s

Police abuse remains one of the most serious human rights violations in the United States. Over the past decades, police have acted out in ways that have made people wonder, are our officer really doing their jobs?. Unjustified shootings have contributed to the ever present problem of police brutality in America. In the late 19th […]

Pages: 7 Words: 2062 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Police Brutality

Police Abuse of Power

Police brutality refers to systematic misuse of authority and powers through the unwarranted infliction of bodily or psychological pain to civilians by law enforcers during their official duties. The routine enforcement of law using excessive force against unarmed civilians and the correctional misuse of facilities to manipulate, inflict, injure or subject a civilian to torture […]

Pages: 9 Words: 2644 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Police Brutality

History of the Fireman in Fahrenheit 451

The book is shown in third-person through Guy Montag, a fireman. But, in the story, firemen do not put out fires, since every house is fireproof. Instead, they cause them, burning books and the houses of the people who own them. Montag is walking home one night when he meets Clarisse, a young girl who […]

Pages: 3 Words: 834 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Fahrenheit 451, Information Technology, Internet

Elements of Comedy in the Play Hamlet

Hamlet is one of Shakespeare’s’ most famous plays, for it revolves around external and internal conflicts or struggles within the main character, Hamlet, which makes it unique from a typical revenge story. Although the genre of the play is a tragedy it contains various elements of comedy throughout the darkest moments of the play. At […]

Pages: 2 Words: 655 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Hamlet, Information Technology, Internet

About Feminism in Hamlet

Ophelia agrees to take Laertes’s advice. She agrees to take his advice because she knows nothing else than to listen a man. She is dependent on men and continues to do whatever they tell her. She saids “this is a good lesson keep, As a watchman to my heart.” (1.3.51) She sees it as he […]

Pages: 3 Words: 769 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Feminism, Hamlet, Information Technology, Internet

Conveying Sentiments to the Reader in Hamlet

In the play, Hamlet, by William Shakespeare, the author uses various literary devices to convey many themes and sentiments to the reader, via his characters’ actions. The play’s focal character – Hamlet – is one that transforms throughout the play quite drastically, yet it can be argued that it was all part of a greater […]

Pages: 5 Words: 1547 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Hamlet, Information Technology, Internet

Youth Homelessness in the United States

Imagine having to live on the streets, in unbearable conditions, never knowing what it is like to be in a stable environment. This presents many challenges faced by children as young as a few months old. These challenges are faced by some of the more than 500,000 children (Bass 2017). These children do not have […]

Pages: 7 Words: 2117 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Homelessness, Information Technology, Internet

Friar Lawrence Takes Romeo and Juliet S Life

Romeo and Juliet have a crazy, secretive relationship, that isn’t like most. The Capulets and the Montagues have a long feud between each other. Romeo and Juliet are not allowe to be seen together due to the feud between the Capulets and Montagues. Through the story, the two become very close, and tried to do […]

Pages: 1 Words: 440 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Romeo And Juliet

The Power of Romeo and Juliet’s Love

Shakespeare depicts in the play, Romeo and Juliet, that love can manipulate and control a person to perform acts they would not otherwise do. The power of love can go beyond the chemistry between two lovers, by affecting the love between parents and child, and even act as a force between two people. This type […]

Pages: 4 Words: 1067 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Romeo And Juliet

Lord of the Flies and World War II

It is a man’s own mind, not his enemy or foe, that lures him to evil ways -Buddha. William Golding’s novel, Lord of the Flies provides multiple examples of historical allusion to reflect the events of World War II and enhance the meaning of the public’s concerns about the conflict between democracy and communism. Throughout […]

Pages: 3 Words: 791 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Lord Of The Flies

The Role of Science in Frankenstein

Mary Shelley tells a story of a scientist who creates a hideous creature in the novel Frankenstein. Victor Frankenstein is an amazing, smart scientist who admired human anatomy, and soon decided to create his own creature. Who is more at fault for the monsters behavior, Victor or the monster? If you were in the monsters […]

Pages: 3 Words: 755 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Frankenstein, Information Technology, Internet

Effect of Rural-Urban Migation on the Poverty Status of Farming Households in Ogbomoso

CHAPTER ONE INTRODUCTION 1.1 Background of the study Needless to say that poverty is a global problem; however the menace of poverty is most devastating in the developing countries of the world. Food production has hardly kept pace with population size and the quantity as well as quality of health has also massively deteriorated. According […]

Pages: 16 Words: 4834 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Poverty

Children in Poverty

15 million children are affected by poverty. 15 million children will not know what it’s like to go to Wegmans every week with their mom and put their favorite snacks in the cart. Thats 21% of all the children in the United States of America. According to OCPP.org, the Gross Annual Income for a family […]

Pages: 2 Words: 593 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet, Poverty

The Importance of Animal Models in Vaccines

If you have ever taken any type of medicine or had a vaccine, you have benefited from animal testing: Research with animals led to vaccinations against smallpox, measles, mumps, and tetanus. The world’s first vaccine was tested on a cow in 1796 during the observation of milkmaids who caught cowpox , which is now called […]

Pages: 2 Words: 607 Topics: Animal Testing, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet
1 2 3 5
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price