Live chat

Research paper topics, free example research papers

You are welcome to search thousands of free research papers and essays. Search for your research paper topic now!

  • 1281 results found, view free essays on page:
  • 1
  • 2
  • 3
  • >>>
  • H G Wells - 207 words
    H. G. Wells H. G. Wells James Lee May 09, 2001 The Invisible Man Grove Block 4 235 Pages Watermill Press, INC. The Invisible Man is a science fiction story of a scientist who finds a way to turn himself invisible. He travels to this small town hiding his identity by wrapping himself in bandages creating wild fantasies of who his real identity is. He stays at the Coach and Horses Inn hosted by a Mrs. Hall who patiently puts up with her new strange house guest's irritability. The stranger goes about his experiments and wishes to be kept alone. Through all this, this mad scientist terrorizes the people of the town by acting as if the town all of a sudden was haunted by ghosts or spirits. Is thi ...
    Related: h. g. wells, small town, invisible man, science fiction, hall
  • Haber Process - 244 words
    HABER PROCESS You are to develop a new industrial plant in the area and a committee has decided that a new ammonia facility is to be built. This plant will use the Haber process in the ammonia production. The ammonia will eventually be used in the production of ammonium nitrate fertilizer. You are to discuss how the ammonia gas is to be produced and where your raw materials can be obtained. Combining Hydrogen (g) and Nitrogen (g) would produce the ammonia. First the gases would go through the compressor to be compressed under about 1000 ATM of pressure. Then the compressed mixture would enter the catalyst chamber to produce the ammonia gas. This would yield about 40 60 % yield ratio. Then f ...
    Related: haber, ohio river, natural resources, raw materials, oxygen
  • Hackers - 2,008 words
    Hackers gescannt von: BITLES new- Jo Hallo erstmal! Ich hab heute fr euch Hacker's Black Book gescannt (kostet normal 30 DM)! In diesem 20 Seiten langen Buch gibt es andeutungen darauf wie man hackt, genaures findet man dann schon selber raus! ****Vorwort zum Scannen!!!**** Ich habe das Buch ja mit Texterkennung gescannt, da kann`s natrlich vorkommen, das statt einem U ein oder umgekehrt erkannt wird, oder das statt rn einfach ein m erkannt wird. Beispiel: pornsite = pomsite Hacker's Black Book Dieser Report ist in zweierlei Hinsicht hilfreich. Er soll Menschen, die ihr Passwort verloren haben, die Mglichkeit geben, es durch Anwendung einfacher Techniken ohne lange Wartezeiten zurckzubekomm ...
    Related: john miller, john smith, credit card, linux, wizard
  • Hackers - 2,055 words
    ... okolliert, herausfinden, wer ihn betrogen hat bzw. es versucht hat. Dazu braucht er lediglich Ihren Zugangsprovider zu kontaktieren und ihm die IP-Adresse mitzuteilen. Die Provider fhren i.d.R. ber die letzten 80 Tage ein Protokoll, wann wer mit welcher IP-Adresse online war. Login-Name Checker Manche Pay-Sites geben mglichen neuen Mitgliedern whrend der Anmeldungsprozedur bereits vor der eigentlichen Zahlung die Mglichkeit, einen Mitgliedsnamen zu whlen. Ist der gewnschte Name bereits vergeben, wird dies mitgeteilt und man soll einen anderen Namen whlen. Gibt man beispielsweise „John als Mitgliedsnamen ein, so sagt der Server meistens, da der Name bereits vergeben ist. Das ist nat ...
    Related: secure sockets layer, filename, user, layer
  • Hackers - 801 words
    Hackers Computer Hacking Explosive growth in the computer industry over the last decade has made new technologies cheaper and simpler for the average person to own. As result, computers play an intricate part in our daily lives. The areas in which computers affect life are infinite, ranging from entertainment to finances. If anything were to happen to these precious devices, the world would be chaotic. Computer hacking is a dangerous crime that could total chaos for the entire world. Some hackers act on revenge or just impersonal mischievousness. But whatever their motives, their deeds can be destructive to a person's computer. An attack by a hacker not only affects the victim, but others as ...
    Related: computer fraud, daily lives, task force, phelps, portray
  • Hackers - 1,033 words
    Hackers The meaning of a hacker is one who accesses a computer that can supposably not be accessed to non authorized people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Methods hackers may use a variety of ways to hack into a system. First, if the hacker is experienced and smart the hacker will use telnet to access a shell on another machine so that the risk of getting caught is lower than doing it using their own system. Ways in which the hacker will break into the system are 1) Guess/cracking passwords. This is where the hacker takes guesses at the password or has a crack program to crack the password ...
    Related: stock market, political system, space administration, indonesian, delete
  • Hackers - 1,437 words
    ... ntinued oppression of East Timor. The attack was online for about 3 hours from 7.00 PM to10.00 PM (Portuguese Time) at the web site of the Department of Foreign Affairs,Republic of Indonesia. The hackers did not delete or change anything. The said "We justhack pages". Another major hack that occurred was on April 1 1981 by a single user.This hacker who was situated in an east coast brokage house was interested in the stockmarket. SO he purchased $100,000 worth of shares in the stock market. Then hehacked into the stock markets main computers and stole $80 million dollars. The hackerwas eventually caught although $53 million dollars was not recovered. On Wednesday,March 5 1997 The home pa ...
    Related: corporate america, operating system, high school, psychology, bias
  • Hackers Hell - 1,271 words
    Hacker's Hell To deal with hackers who break through office systems through the Internet it is important for information managers to understand their enemy well. If they have sound background knowledge about hackers, they might be prepared to deal with them in a much more effective method. Hackers are very educated often mostly university or high school students who try to break through systems for which they have no authorization. They deal poorly with people, have few friends and less relationships, but at the same time are very smart. Therefore they revert to computers because they know computers will not reject them. With bulletin board communication they can form social relationships bu ...
    Related: internet usage, electronic mail, computer crime, hacking, hacker
  • Hackers Hell - 1,250 words
    ... .55) According to Barry Weiss, a partner at Gordon & Glickson, a Chicago law firm that specializes in information technology legal issues, for the Internet to be used as a effective tool for communication companies need to define policies and procedures to avoid risk. (Wagner, p.58) Another method in which companies can protect their office systems from hackers is by asking employees to develop and maintain smart passwords. Employees should not write down their passwords and leave them near a computer. They should create password which relate to people closely related to them. Also they should not share their password with anyone and near should they store their passwords in the computer ...
    Related: information technology, office automation, south western, encrypted, accomplish
  • Hacking - 352 words
    Hacking Hacking has been developed over the years to be unstoppable. Newcomers to the hacking community learn the rules by associating with established hackers. Hackers like to hack in order to impress each other. Hackers also do not know about the cost results of their actions. All studies show that hackers are generally young, and do not have full-time jobs or own property. They do not consider that if they do get into a system and make an unintentional, simple mistake, they could cost the company thousands, and possibly millions of dollars. I think that every computer professional, including the best, have mad a mistake that has caused the loss of data, service or money. Young hackers do ...
    Related: computer hacking, hacking, president clinton, system administrator, nowadays
  • Hacking - 1,173 words
    Hacking Imagine this, you are driving along the road and suddenly you see something spectacular. Now imagine that you are not allowed to deviate from your course to check it out. This is what a so-called "hacker" faces. Just imagine that you saw an injured person on the side of the road. In this analogy you are not allowed to help the injured person. A hacker is not allowed to explore like everyone else in the world. A hacker is not allowed to help fix potential security holes. The term hacker can have many meanings. The most visible to the public is the person pirating software, and breaking into corporate networks and destroying information. This is the public misconception of a hacker. Ba ...
    Related: hacking, companies make, computer crime, high school, criminal
  • Hacking For Money - 1,955 words
    Hacking For Money Many of the products we buy today are no more than large collections of zeroes and ones. High-priced software, high-quality music, and valuable reference material such as computerized databases or CD-Rom encyclopedias are commercial products like any other, but the media of their transmission makes them different in at least one aspect: it is possible to copy them freely, or at least extremely cheaply. A compact disc of Elvis Costello and the Attractions is different from, say, a ham and swiss sandwich in many ways, but beyond the obvious is one reason that makes the nature of the two items and their production and purchase very different indeed: I can only eat the ham and ...
    Related: hacking, visual arts, state university, electronic media, disc
  • Hacking For Money - 1,941 words
    ... sign my own operating system from the ground up when I can take the work done by Linus Torvalds and the hundreds of other skilled programmers around the world, and bend it to my whim? This is a much more flexible system than one in which I must depend on Microsoft to provide me with every convenience I desire. How does this apply to the arts, though? Software is almost universally the kind of thing that is constantly being altered, updated, and optimized. Art is generally considered a thing that is made once and finished afterwards. I don't plan on remixing or modifying my Elvis Costello and the Attractions CDs. But should our copyright and licensing laws necessarily prohibit those who w ...
    Related: hacking, world wide web, marshall mcluhan, hard drive, advertising
  • Had More Sense Whether His Neighbors Were Cool Or Not Was Not - 1,580 words
    had more sense. Whether his neighbors were cool or not was not really the point; Derek was a private person and did not like to feel that his comings, goings, and doings were known to just anyone. Oddly enough, Derek could justify the volume of his music because it served to mask his personal actions. He looked at Arthur who was eyeing him, fists on hips, with a sardonic grin. Derek ignored it. "You want some?" he said. It was more of a statement than a question; Arthur was an avid smoker of "the Herb". "Sure, if you haven't already smoked it all." Arthur was trying to joke, but Derek suddenly did not feel like responding. He was vaguely aware that he was not being very friendly, but Arthur' ...
    Related: cool, hong kong, real world, last time, joke
  • Had More Sense Whether His Neighbors Were Cool Or Not Was Not - 1,570 words
    ... mfortable, or even to mildly imitate the role which he felt was required here. But his natural feelings of transparency (which in everyday life he managed to cover with an act), along with the disorientation caused by the drug, loomed so large that Derek could not understand where to begin acting. Arthur thought he understood. "Look, man, everybody in there is stoned," he said gently. "Just act natural. And besides, nobody cares, anyway." Arthur continued pushing and prodding, and slowly Derek let himself be convinced (although he did not know what Arthur meant by "act natural"). He got out of the car, trying to relax. He felt disoriented, uncomfortable and depressed (like he usually did ...
    Related: cool, carried away, video games, everyday life, snowy
  • Hades Did You Know That Hades Is The Richest God He Could Buy Anything He Has A Lot Of Gold And He Could Buy Mexico Or Better - 314 words
    HADES Did you know that Hades is the richest god? He could buy anything. He has a lot of gold and he could buy Mexico or better artillery for our country. Hades is the king of the Underworld and is married to Penelope. Hades can watch the country in his Underworld, and if someone breaks a law he can take them to the Underworld where they will stay for the rest of their lives. Hades already rules the Underworld, don't you think he can rule this country? Hades is the choice for President of the USA. Hades could solve a lot of the bad problems. He would know what is going on. He could move the White House underground and watch everybody from there. He wouldn't come up unless he had to capture a ...
    Related: hades, mexico, richest, white house, taxes
  • Haiti - 610 words
    Haiti Want to send this story to another AOL member? Click on the heart at the top of this window. Haiti Opposition Candidate Released By MICHAEL NORTON .c The Associated Press PORT-AU-PRINCE, Haiti (AP) - Haitian authorities released an opposition candidate and four associates Saturday, nearly three weeks after they were arrested following regional elections, an opposition leader said. Authorities dropped charges of incitement to violence against candidate Jean Limongy and the four others, said Evans Paul of Limongy's Space for Concord five-party coalition. Limongy, a candidate for a lower house seat, and the others were arrested May 23, two days after local and legislative elections. More ...
    Related: haiti, associated press, city council, free elections, legislative
  • Haiti Opposition Candidate Realesed - 614 words
    Haiti Opposition Candidate Realesed Want to send this story to another AOL member? Click on the heart at the top of this window. Haiti Opposition Candidate Released By MICHAEL NORTON .c The Associated Press PORT-AU-PRINCE, Haiti (AP) - Haitian authorities released an opposition candidate and four associates Saturday, nearly three weeks after they were arrested following regional elections, an opposition leader said. Authorities dropped charges of incitement to violence against candidate Jean Limongy and the four others, said Evans Paul of Limongy's Space for Concord five-party coalition. Limongy, a candidate for a lower house seat, and the others were arrested May 23, two days after local an ...
    Related: candidate, haiti, free elections, associated press, jean
  • Haitian Creole - 1,367 words
    Haitian Creole Christopher Columbus claimed Haiti when he landed there in 1492. Arawak Indians were the original inhabitants of this island when Columbus arrived. Later, the island became a colony of England. Haiti remained virtually unsettled until the mid-17th century, when French colonists, importing African slaves, developed sugar plantations in the north. Under French rule from 1697, Haiti (then called Saint-Domingue) became one of the world's richest sugar and coffee producers. Soon, Haiti became a land of wealth with the vast use of slavery as their method of production. The rising demand for sugar, coffee, cotton, and tobacco created a greater demand for slaves by other slave trading ...
    Related: creole, haitian, haitian revolution, third world, political issues
  • Haitian Creole: A Review Of Slavery And Creation - 1,113 words
    Haitian Creole: A Review Of Slavery And Creation Christopher Columbus claimed Haiti when he landed there in 1492. Arawak Indians were the original inhabitants of this island when Columbus arrived. Later, the island became a colony of England. Haiti remained virtually unsettled until the mid-17th century, when French colonists, importing African slaves, developed sugar plantations in the north. Under French rule from 1697, Haiti (then called Saint-Domingue) became one of the world's richest sugar and coffee producers. Soon, Haiti became a land of wealth with the vast use of slavery as their method of production. The rising demand for sugar, coffee, cotton, and tobacco created a greater demand ...
    Related: haitian, haitian revolution, slavery, women slaves, slave trade
  • 1281 results found, view free essays on page:
  • 1
  • 2
  • 3
  • >>>