Internet Essay Examples and Topics

Updated:
478 samples

The Internet: A Blessing or a Curse?

In light of this reality of the two faces of the internet, there has risen the question of whether the internet is a blessing or a curse to mankind.
  • Pages: 6
  • Words: 1764

Social Media: Beneficial or Harmful?

Social media is a core element of the internet, and it reshaped how a modern human perceives information, communicates, socializes, and learns about the outside world.
  • 5
  • Pages: 5
  • Words: 1469

Internet Trolling, Its Impact and Suggested Solutions

The vast extent of internet trolling is partially explained by the diversity of the topics in which trolls are engaged. Celebrities are among the most popular trolling victims because they have a lot of admirers [...]
  • Pages: 8
  • Words: 2304

The Invention of Internet

Several events led to the advancement of the internet in the world today. The level of computer literacy in the world played a leading role in the advancement of internet as teachers and students wanted [...]
  • 5
  • Pages: 4
  • Words: 1140

The Internet: Arguments Against and for It

The internet has brought a lot of changes to the information industry. This is because there are a number of deficiencies found on the net that leave it wanting.
  • Pages: 3
  • Words: 636

Internet Usage: Major Theoretical Theories

The world has become a global village, thanks to the development and rapid growth of the internet. Such social systems are used by the dominant group in society to promote their own interests and guard [...]
  • Pages: 4
  • Words: 1409

Bluetooth Technology in Your Life

Bluetooth Smart Ready mechanisms are the gadgets receiving information sent from the conventional Bluetooth and Bluetooth Smart gadgets and passing it to the applications, which make use of those data.
  • Pages: 9
  • Words: 2518

Telegram Role in Communication

The telegram was the easiest and the fastest means of communication in the nineteenth century. I was very excited and any other scheduled activity came to a standstill as I focused my attention on the [...]
  • Pages: 3
  • Words: 866

The Role of the Internet for Modern Society

Five years later, the internet was plagued by worms which deterred the development and use of the internet altogether. Parents should therefore restrict access to internet websites through the use of internet tools.
  • Pages: 3
  • Words: 904

Effects of Internet Use in Society

Excessive use of the internet causes a person to feel lonely and depressed. The internet has provided the society with a lot of information both good and bad.
  • Pages: 3
  • Words: 879

The Dark Web, Its Structure and Functionality

The objective of this paper is to provide the description of the Dark Web, its structure and functionality, review the content and services offered through this network, and evaluate the impact of illegal activities performed [...]
  • Pages: 10
  • Words: 1979

Threats of the Internet

Such digital giants as Google and Amazon have access to all the personal and behavioral information that we share on the net, and though they claim to use for our benefit, the algorithms of the [...]
  • 5
  • Pages: 3
  • Words: 864

Responsibilities of Internet Users

Along with so many advantages of the internet, there are some very serious disadvantages that are associated with the usage of the internet and it is the responsibility of the internet users to be aware [...]
  • Pages: 7
  • Words: 2153

Push Versus Pull Technology

Therefore, the number of business applications as well as the tools and protocols that guide the operations of the internet will keep on increasing.
  • Pages: 6
  • Words: 1617

System and Application Software Difference

Both system software and application software are programs for the computers, but system software includes the programs that are provided together with the installation of the operating system for the computer.
  • Pages: 2
  • Words: 581

The Role of Internet in Formation of Popular Culture

The computer is a scientific device that accepts the log-in information and thereafter manipulates it to produce the desired result based on the program of instructions on how data is to be processed.
  • Pages: 7
  • Words: 1989

History of the Internet

In the late 1960s, some proponents of the internet conducted research to find out the likelihood of interconnection between systems using the ARPANET.
  • Pages: 3
  • Words: 961

Internet of Things for Home: Benefits and Challenges

The IoT can be characterized as the unification of the virtual and real worlds with the help of many devices and sensors connected to the same network and providing interaction between machines and people.
  • Pages: 10
  • Words: 2771

The Internet’s Good and Bad Sides

On the other hand, the internet is the root of some of the bad evils that have befallen many people, true and the internet is the beginning of what Gibson described as a place to [...]
  • Pages: 6
  • Words: 1632

Internet and Ethical Challenges

The Internet began in 1969 as an experiment of the United States Defence Department that resulted in the Advanced Research Projects Agency Network. In 1993, the number of internet users increased dramatically to get the [...]
  • Pages: 8
  • Words: 2322

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Pages: 4
  • Words: 1285

The Importance of Web Portals

In some organizations the company portal is used by employees and clients to access important services that are available virtually. Tender's portals are used by bidders to bid for bidding tenders electronically which is much [...]
  • Pages: 2
  • Words: 645

Government Regulation of the Internet

Regulation of the internet will eliminate or reduce the anonymity of using the internet and therefore help to reduce the exploitation of women and girls.
  • Pages: 3
  • Words: 849

The Role of the Internet in Business

The thesis statement The role of the Internet in business cannot be neglected, as the World Wide Web can be regarded as one of the most powerful and effective tools for conducting business.
  • Pages: 4
  • Words: 1090

Wi-Fi Technology and Applications

This paper discusses the Wi-Fi application and the technology behind its operation and functionality. This is a set standard within the wireless domain and is based on IEEE802.
  • Pages: 4
  • Words: 1343

Internet Should Be Free From All Government Control

A report by the group of eight most developed countries in the world, the G 8, indicates that information and communication technology is one of the most powerful forces that will play a decisive role [...]
  • 5
  • Pages: 9
  • Words: 2860

Advantages and Disadvantages of Online Dating Essay

Advantages Unlike offline dating, online dating allows the user to interact with millions of people without having to travel. Similarly, with the use of online dating some people have been able to lie about their [...]
  • 3.6
  • Pages: 5
  • Words: 1449

Impacts of Internet on Children Health and Addiction

Among the worst hit are children, who find themselves addicted to it given that they are in the process of development. To help nurture children's behavior, parents should educate them on the safety and risks [...]
  • Pages: 3
  • Words: 1105

Cryptography and Privacy Protection

The main ethical issue is the dilemma between the privacy of a group and individuals and their safety and security, for example, on what side the government would want to maintain the privacy of its [...]
  • Pages: 8
  • Words: 2286

Internet Files Sharing

The tutor and the student are now able to communicate and exchange file over the internet in form of lessons, instructions, and assignments online.
  • Pages: 4
  • Words: 1079

Internet: Wimax vs. Fiber Optics

The research will also seek to identify the level of awareness regarding the viability of both WiMAX and fiber optics technology in the deployment of access networks.
  • 5
  • Pages: 10
  • Words: 3135

Privacy and Safety on the Internet

The user should have knowledge of how his or her information is being collected, the purpose of collection and how the party is going to use the information. The final security measure to ensure safety [...]
  • 5
  • Pages: 4
  • Words: 1126

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Pages: 2
  • Words: 661

Network Design for Business

The physical and the logical layout structure of the network have to match the design and the business needs in that particular context.
  • Pages: 4
  • Words: 1083

The Development of the Internet

Licklider of MIT suggested a way of linking computers in 1962, and relocated to DARPRA later in the same year to champion the efforts of developing it.
  • Pages: 4
  • Words: 554

E-bazaar Implementing Virtual Private Networks

With increase in the popularity of the internet, many businesses turned to the internet in order to cut on running costs and expand their network which has eventually paved way for the evolution of virtual [...]
  • Pages: 12
  • Words: 1855

Free Speech on the Internet Overview

The growing pace in the use of the internet for expression has been elating: it is a renewal of the fight for democracy and the restoration of egalitarianism.
  • Pages: 2
  • Words: 586

Router as Component of a Network Connection

In terms of their mode of operation, routers generally make use of protocols for communicating with other computers on the network in order to find the best path between them.
  • Pages: 5
  • Words: 1397

The Detailed Network Design and Layout Implementation

The internal network is connected to the external network with a T-1 link from Verizon using a dynamic NAT router installed and tested and overloaded with PAT to support a higher number of clients with [...]
  • Pages: 3
  • Words: 827

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Pages: 3
  • Words: 832

Zoom Technology and Its Ethical Issues

According to Zoom operators, the organization promised end-to-end encoding, but the commission alleges the end-to-end encryption provided was being stored on its server.
  • Pages: 5
  • Words: 1456

Association of Computing Machinery (ACM)

This is mainly because the field is wide and hosts millions of professionals, researchers, as well as educators that strive to improve scientific computing. The main aim of this association is to promote computing as [...]
  • Pages: 3
  • Words: 990

Digital Storytelling Projects

As the author of the site noted, the project is the online meeting place for community digital storytelling advocates and facilitators.
  • Pages: 3
  • Words: 815

Yahoo Inc.: Competing on the Edge

Internet based companies have increased over the last decade as facilitated by the invention of the World Wide Web and the internet.
  • Pages: 7
  • Words: 2070

What Is a Wiki? General Description and Purpose

The name of this premier wiki was borrowed from that of the buses, which ply within the Honolulu International Airport's terminals, which are known by the name "Wiki- Wiki Shuttle".
  • Pages: 12
  • Words: 3310

Internet Services, Connections, and Limitations

The third limitation of the current internet is language development limitations related to web development tools such as HTML, which are not efficient in the development of databases and online communication platforms.
  • Pages: 2
  • Words: 927

Wireless Networks’ Historical Development

The paper concludes by describing the implications of wireless networks for different emergency agencies and the police. The history of wireless networks is "founded on the development of the first wireless telegraph".
  • Pages: 8
  • Words: 2276

Technology and Personal Devices

It is obvious that many programs and applications greatly help collect, organize and store data and statistics, as well as manipulate information, represent it graphically and send it to a distant location, and this has [...]
  • Pages: 2
  • Words: 580

What is a Weblog?

It also crucially important to underline the purposes of this essay: to present all the necessary information about blog's essence, to underline what makes weblogs popular, to clear up who read weblogs and why, to [...]
  • Pages: 2
  • Words: 636

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Pages: 8
  • Words: 2247

The Internet, Globalization and Network Society

The embracing of the internet's usage as a means of communication in the future will depend on the evolvement of people's quality of online relationships and the amount of time people are bound to be [...]
  • Pages: 3
  • Words: 836

Home Networking Problems and Mistakes to Avoid

With the ever-increasing need to have access to the internet and telecommuting, individuals are being compelled to set up home networks that can guarantee access to the internet for the purposes of working, education, and [...]
  • Pages: 17
  • Words: 7648

Internet as a Basis for “Knowledge Monopoly”

As a result of the internet being incorporated in day to day lives, this study will try to investigate whether "Internet creates favorable conditions for monopolization of knowledge, the role of the Internet, as a [...]
  • Pages: 7
  • Words: 2256

Optus Solutions: Facebook as a Communication Medium

This information was gathered and documented for use in the report to determine if the company was using the right channels and media of communication to reach existing and potential new customers to the company.
  • Pages: 11
  • Words: 2962

Benefits of the Internet

One of the uniqueness of using internet to communicate is that, there are no barriers, as people can connect easily at any place and all the time.
  • Pages: 4
  • Words: 1123

LAN Network Diagram Overview

The twisted-pair cable is used in the given diagram, which is considered the most common type of cabling for LAN. In the given Network Diagram, the unshielded twisted-pair cable is used.
  • Pages: 1
  • Words: 158

Influence of YouTube and Facebook on Business

Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
  • Pages: 3
  • Words: 2171

Overview on 4G Technologies

The major plan of 4G technology is to ensure that users can access and have a faster and more reliable internet access on their mobile phones and the mobile broadband services and combine all other [...]
  • Pages: 3
  • Words: 921

Computer Problems

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Pages: 3
  • Words: 1056

Windows Vista vs. Windows XP

The new Windows Vista is highly recommended and it is mainly useful for a medium-sized information-service company and it rates higher than the current Windows XP for a number of reasons.
  • Pages: 3
  • Words: 837

Routing Protocols: RIP, EIGRP, and OSPF

The scope of the current project entails the use of interior protocols such as RIP, EIGRP, and OSPF. One is Distance-vector routing and the other is Link-state routing.
  • Pages: 2
  • Words: 601

Mobile Wireless Internet vs. Wi-Fi

The following paper will compare and discuss the advantages and disadvantages of regular 3G and Wi-Fi connections to the World Wide Web.
  • Pages: 3
  • Words: 902

Emerging IT-Related Technology’s Ethical Issues

The 21st century is marked by the development of information technology and the emergence of IT-related technologies. The ethical dilemma under research is privacy and confidentiality on the application of emerging technology such as online [...]
  • Pages: 2
  • Words: 589

PC Network Troubleshooting

For instance, simple restart of the program, sending the signal to the system in order to reload the initialization file restores the problem.
  • Pages: 10
  • Words: 2780

Concept of Steganography in Society

The clandestine communication is attached to the carrier to create the steganography medium. The recipient of the message had to trim the messenger's hair to retrieve the communication.
  • Pages: 11
  • Words: 3157

Cheating in the Internet

The presence of ecommerce has increased the number of fraudulent deals in the internet. However, with the increasing number of transactions in the internet, fraudsters are taking advantage of the situation.
  • 1
  • Pages: 4
  • Words: 1083

Microsoft SharePoint Tool

However, the introduction of Microsoft SharePoint into the sector is changing the situation. After collecting the data Microsoft SharePoint analyses the data, and share the information with the rest of them.
  • Pages: 5
  • Words: 1383

Information Technology in People’s Lives

This has prompted many to be more vigilant and to prosecute with the full force of the law any British citizen found guilty of violating standards and statutes with regards to the use of the [...]
  • Pages: 6
  • Words: 1632

History of the Networking Technology

The development of computer networks is the answer to the urgent need of the modern day workplace to have the ability to receive and send information quickly and efficiently.
  • Pages: 10
  • Words: 2699

Li-Fi as the Future of Wireless Technology

It is important to discuss the problem associated with the use of wireless communication technologies, accentuate the goals and significance of this study, present research questions, and review the recent literature on the topic of [...]
  • Pages: 6
  • Words: 1591

Internet of Things and Its Level of Implementation

IoT is defined as a collection of tangible objects embedded with processing abilities, sensors, and software to connect and exchange data with other systems and devices using the internet and other communication networks.
  • Pages: 6
  • Words: 1666

Ethical Issues of the Internet Use for Research

Naturally, this is not ethical to contribute to the violation of the confidentiality of individuals who have shared any information online, even if it is unintentional, considering that it has not been authorized by the [...]
  • Pages: 3
  • Words: 921
Research Title Generator
We’ll help you brainstorm great title ideas for your essay, research or speech in no time!
Research Question Generator
Get a list of ideas for your essay or term paper. We’ve prepared the best research question generator.
Title Page
Generator
Craft a paper title page with just a couple of clicks. Get it in APA, MLA, Chicago, or Harvard without any effort
Updated: