Welcome! AllFreeEssays.com is now Brainia.com. Same services, new name! Any questions or comments on this change? Contact Us .

60 Free Essays on Computer Use And Misuse

  1. Computer crime

    Computer Crime A young man sits illuminated only by the light of a computer screen. His fingers dance across the keyboard. While it appears that he is only word processing or playing a game, he may be committing a felony. In the state of Connecticut, computer crime is defined as: 53a-251. Co

  2. Computer crime: prevention & innovation

    Computer Crime: Prevention and Innovation Since the introduction of computers to our society, and in the early 80's the Internet, the world has never been the same. Suddenly our physical world got smaller and the electronic world set its foundations for an endless electronic reality. As we

  3. Computer

    McAfee Readme.1st for Retail and OEM Customers Copyright 1994-1997 by McAfee Associates, Inc. All Rights Reserved. Thank you for using McAfee products. This file provides details regarding your product license and registration. For product-specific information, including new f

  4. Short and long term effects of marijuana use among adolescents

    Substance use, especially the smoking of marijuana, has been a major part of societal functions since the 1960s where its prominence was greatest. During the "Summer of Love" era, many ignored the potentially harmful effects marijuana would have on their bodies and used it as a method of breaking aw

  5. Computer fraud and crimes

    Computer Fraud and Crimes In the world of computers, computer fraud and computer crime are very prevalent issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerab

  6. Artificial neural networks for misuse detection

    Abstract: Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems to identify indications of known

  7. Computer crime 3

    Computer technology has brought us into an era that is no longer run by man but instead is dependent on computers due to their incredible capabilities. Mankind has progressed further in the last fifty years than any other period of history. This reason is due to the introduction of computers

  8. America and the computer industry

    America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.

  9. “Drug Use and American Youth”: a Critique

    John T. Rine Engl 1010-049x Interpretive Paper Assignment Due 12/16/04 “Drug Use and American Youth”: a Critique The purpose of this paper is to present a critique, including an academic grade, of the paper “Drug Use and American Youth” based upon the criteria for quality academic w

  10. Computer addiction

    COMPUTER ADDICTION Addiction - "a habit so strong that one cannot give it up." We are all aware that people form addictions to many things, from cocaine to gambling. References to alcoholism, workaholism, even chocoholism, are commonplace throughout our society. The idea that people can form addic

  11. The availability and use of screen reading technologies for computer users who are sight impaired

    Summary of Screen Reading Technology Screen reading technology allows a blind/visually impaired or learning disabled person access to information from the computer screen through auditory means. As explained by Neville Clarence Technologies, Ltd: Screen reading software gives the user control over

  12. Benefits of computer games

    Recently, in this modern world that we live in, through the course of the improvement of technology, computer games became very popular among the youth. Whether we like it or not, computer games greatly influences our society today. Computer games become a part of people's lives. Almost everyone has

  13. Computer crime

    Computers are made to make home, school, and office life easier, society relies on computers. As a result of this computer use grows minute. Along with the growing use of computers comes widespread computer crime. In my paper I will talk about different types of crimes and some ways that you can av

  14. Computer Virus

    "Traces of the Stealth_c Virus have been found in memory. Reboot to a clean system disk before continuing with this installation…" This was the message staring back at me from one of the computer monitors at my office. Questions raced through my mind. "Stealth_c?" "What's a system disk?" "How a

  15. Teenage Drug Use

    Teenage Drug Abuse Teens that use drugs don't think about or realize the long term effects drugs have on them. All they know is that while they are on that high; they feel good and could care less about anything that really matters. I believe that drugs affect a teens mind, body, and f

  16. The human brain vs. the computer

    The Human Brain vs. the Computer Over the millennia, Man has come up with countless inventions, each more ingenious than the last. However, only now, as the computer arises that mankind's sentience itself is threatened. Ridiculous, some may cry, but I say look about you! The computer has alrea

  17. Are "good" computer viruses still a bad idea?

    Are "Good" Computer Viruses Still a Bad Idea? Vesselin Bontchev Research Associate Virus Test Center University of Hamburg Vogt-Koelln-Str. 30, 22527 Hamburg, Germany bontchev@fbihh.informatik.uni-hamburg.de [Editor's note: Vesselin's current email address is bon

  18. Computer literacy

    English II 31 October 2005 Research Paper Computers as a Part of Primary Education Today's society is becoming more and more dependent on electronic devices. The skill needed by normal everyday people has changed over the years. The population needs to become more computer smart if it is to sta

  19. Mandatory Use of Seatbelts Saves Lives

    Mandatory Use of Seat Belts Saves Lives. Wearing a seat belt is the single most effective thing we can do to save lives and reduce injuries on America’s roadways. Failure to wear a seat belt contributes to more fatalities than any other single traffic safety-related behavior. Seat belts are the m

  20. Computer hackers

    Computer Hacker The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Methods Hack

  21. An ergonomic evaluation of the kinesis computer keyboard

    An Ergonomic Evaluation of the Kinesis Computer Keyboard 1. Introduction In this information-technology age, everyday tasks are more and more related to computer. That ranges from basic jobs such as providing food recipes for housewives to complicated ones such as analyzing laboratory experimen

  22. Objection to Cellphone Use

    Objections to Cellphone use In certain places Introduction These days it is not uncommon having people going about their jobs with head inclined and one hand curled over the ear. These people also seem to be talking to themselves , they waggle their hands and smile , laugh ,snarl at nobody arou

  23. The Impact Technology Will Have on Effectiveness of Education

    The Impact Technology Will Have on Effectiveness of Education What fundamental assumptions of our society will be altered as a result of the computer revolution? The first thing to understand regarding the question posed is that this revolution is not an event b

  24. Dickens' Use of Nature

    Use of Nature Dickens’ use of nature to mirror humane emotion is effective especially during dramatic events in the story. Natural phenomena and the element of weather can play a certain role in conveying the emotions of events and the characters themselves. In many epic works of literature, sto

  25. The Use of Addictive Drugs

    The Use of Addictive Drugs Who uses drugs, and why? MOST drug users live in the poor world, not the rich. Countries such as China and Pakistan in the case of heroin, and Colombia (South America's second most populous country) in the case of cocaine, have local traditions of drug use an

  26. Computer security and the law

    Computer Security And The Law I. Introduction You are a computer administrator for a large manufacturing company. In the middle of a production run, all the mainframes on a crucial network grind to a halt. Production is delayed costing your company millions of dollars. Upon investigating, y

  27. Computer Forensics

    The growing field of Computer forensics came into being as a response to the increasing amount of criminal activity that makes use of or targets computers and the internet. The field of computer forensics is still considered to be a relatively new field developing in the early to mid 1980’s with t

  28. Viruses, trojan horses and worms can be the cause of damage to a computer system – are people who generate them breaking the law? use examples or case studies from the press or text books to explain your answer

    Introduction: First of all we would like to know what exactly are virus, Trojan horse and worms. Viruses, worms, and Trojans are malicious programs which enter to your computer without your permission and knowing that can cause damage, information losses, privacies leak to your computer .They can a

  29. A Comprehensive History of Computer Languages

    A Comprehensive History of Computer Languages The history of computer languages can be traced back to the 1940's. In that day, the primitive nature of computers forced programmers to write hand-tuned assembly code. This was tedious and demanding. In 1948, a man named Konrad Zuse, published a p

  30. Computer viruses

    <b>Introduction</b><br>In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it's coined, a new methodology in crime has been created. Electronic crime has been responsible