Unsung heroes

Sort By:
Page 9 of 32 - About 311 essays
  • Decent Essays

    The 21st century can now be referred as the golden age of evolution of communications technology. Improved data management, data transmission, communication, digitalization of almost each and everyday necessities i.e. banking, insurance deposit, medical records, traffic control, social media, transportation, security surveillance lighting systems, heating and cooling systems and many more are now controlled or automated via computer. It can be said that our lives are totally encompassed with computers

    • 818 Words
    • 4 Pages
    Decent Essays
  • Good Essays

    The television show Survivor focuses on a group of strangers in an isolated location, where they compete in challenges for rewards and immunity from being eliminated, as well as having to provide shelter, food, and fire for themselves. The winner is decided by a vote from the eliminated contestants, also known as the jury. Contestants are voted off at tribal council, but have the chance to be immune from the vote through immunity challenges. Contestants in Survivor are affected physically, psychologically

    • 1927 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Every day, hospitals in the United States and around the world are working long hours in responding to emergencies, attending patients, delivering newborn babies, performing surgeries, and foremost – saving lives. Not too long ago, cyberspace has given institutions such as hospitals the tools to accumulate and file as much information and data as possible in this great space of technology, networks, and systems. Information such as patient’s information, treatments, machinery, as well as having a

    • 1628 Words
    • 7 Pages
    Good Essays
  • Best Essays

    Hacking sweeps the nation Essay

    • 2084 Words
    • 9 Pages
    • 3 Works Cited

    “We cannot defend ourselves with a weapon…but we can do this with their cars, homes, bars, brothels and everything else in their possession. It won’t be difficult; we all know who they are and where they are located.” Quoted from an Anonymous member. (Schiller, A.6.) Computer hacking began in the 1950s with an individual looking out for his own personal gains; like free phone calls for instance. The perception of hackers ever since has become very negative. Hacking has evolved over time, with many

    • 2084 Words
    • 9 Pages
    • 3 Works Cited
    Best Essays
  • Better Essays

    The Significance of the Open-Source Act and Linux In the 1980's hardly anyone knew what a DOS attack was, most people hadn't ever seen a computer. There was one great OS for companies back then, UNIX. Unix was commercially made, very expensive, but was a very strong Operating System. Because of the price of equipment, many people wouldn't get into computers, but there was no reason to. Nothing of great significance was stored on computers. By 1985, computers hit the mainstream, providing

    • 2238 Words
    • 9 Pages
    • 4 Works Cited
    Better Essays
  • Good Essays

    Beowulf and The Saga of King Hrolf Kraki      There are so many similarities between the hero of the poem Beowulf and The Saga of King Hrolf Kraki, an Iceland saga representing 1000 years of oral traditions prior to the 1300’s when it was written, that these similarities cannot be attributed solely to coincidence.   The Cambridge History of English and American Literature states that the hero of the poem, Beowulf himself, may be the same person as Bodvar Biarki, the chief of Hrolfr

    • 976 Words
    • 4 Pages
    • 4 Works Cited
    Good Essays
  • Good Essays

    Why Hackers Do The Things They Do? Hackers. You know them as gangly kids with radiation tans caused by too many late nights in front of a computer screen. Evil beings who have the power to wipe out your credit rating, cancel your cable TV, raise your insurance premiums, and raid your social security pension. Individuals who always avert their eyes and mumble under their breath about black helicopters and CIA transmissions. Paranoid, social deviants who could start World War III from the privacy

    • 1346 Words
    • 6 Pages
    Good Essays
  • Decent Essays

    Username: Sameem Past Username/s: https://namemc.com/profile/Sameem/f820c8c9 Age: 14 Timezone + Country: Est, Canada Previous bans (Don 't lie): I have been tempbanned 2 times. Both for xray admitted. Do you have a working mic: Yes, I do. I have a blue snowball ice Any experience being staff?: Yes, I have had past experience. We will take some of this scenarios ? Scenario 1: You are in a fight against another player and you get a hacker notification what do you do? If I see the hacker notification

    • 1824 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Handbook Assignment

    • 1471 Words
    • 6 Pages

    IGN: Silverware, although I 'm planning on switching back to "baggie" in the near future. Age: 16 Timezone: EST Why should you be chosen as a staff member: I 'm a very helpful person. I 'm always online, so I can always be helping in teamspeak. The server has a ton of players coming on each day, so the teamspeak support rooms are really busy. I can do my best to clean them out, and help every player in there. Not only can I help in teamspeak, but I can also help in game. If a player has

    • 1471 Words
    • 6 Pages
    Decent Essays
  • Better Essays

    The Past, Present and Future of Computer Hacking Abstract Society relies heavily on technology for many things, but our use of technology opens us up to become victims of cybercrimes, like computer hacking. Hackers can be divided into three main categories: novice, intermediate, and elite. Hacking has been in the information technology (IT) field for a while. The first hackers appeared in the nineteen sixties and hackers have continued to make progress since then. People hack for a variety of

    • 1923 Words
    • 8 Pages
    Better Essays