We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

The Evolution Of The Saw
Number of words: 698 - Number of pages: 3

.... different conditions. Eventually more complex designs were discovered. These new designs allowed for the precision cutting of hardwood, softwood, with the grain, against the grain, and even raked out the unwanted sawdust. These saws differed in the layout of the teeth. Instead of the jawbone patter the teeth were placed in a "left-right-angled" pattern, to rake the sawdust, and were placed at different distances depending on the substance being cut. As these handsaws progressed and continued to make the job of the wood worker less difficult logger began to take interest in the idea of .....

Get This Paper

Software Piracy: A Big Crime With Big Consequences
Number of words: 2190 - Number of pages: 8

.... individual served and maintained a computer that was connected to the internet that offered it's users more than one million dollars worth of software 'free of charge.' Mr. LaMacchia was caught by the authorities and was acquitted of this piracy due to the lack of legal standards for this crime. Another example is off local bulletin board systems. Many are run out of the offenders homes with just a phone line, a computer and a modem. Here members of this service can send and receive pirated software (otherwise known as 'warez') as their own pace and leisure. There are not just one or two o .....

Get This Paper

Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection
Number of words: 548 - Number of pages: 2

.... 3. Telecommunications: also known as a Wide Area Network, this entails the connection of computer systems to each other via modems, and telephone lines. This is the vector most feared by computer users, with infected files being rapidly passed along the emerging information super-highway, then downloaded from public services and then used, thus infecting the new system. 4. Spontaneous Generation: this last vector is at the same time the least thought of and the least likely. However, because virus progra .....

Get This Paper

Cyberspace
Number of words: 1330 - Number of pages: 5

.... owns the Internet and has the responsibility to determine who uses it and how itis used. The government must control what information is accessible from its agencies. This material is not lawfully available through the mail or over the telephone, there is no valid reason these perverts should be allowed unimpeded on the Internet. Since our initiative, the industry has commendably advanced some blocking devices, but they are not a substitute for well-reasoned law.4 Because the Internet has become one of the biggest sources of information in this world, legislative safeguards are imperati .....

Get This Paper

Auditing Computer Security
Number of words: 1201 - Number of pages: 5

.... determines the amount and type of security logging performed on the individual computer. You will first plan the policy, then implement it, and finally view the results. You can set up on audit policy for a domain to: track the success and failure of events, such as when users attempt to log on, read a file, make changes to user and group permissions, change the security policy, and make a network connection. Eliminate or minimize the risk of unauthorized use of resources. Track trends over time by maintaining an archive of security logs. Tracking these trends is useful in determini .....

Get This Paper

Knowledge Is Power: How To Buy A Computer
Number of words: 1563 - Number of pages: 6

.... figure out how powerful a computer the consumer needs, therefore, a person must first determine which programs he wants to run. For many buyers, this creates a problem. They cannot buy a computer until they know what they want to do with it, but they cannot really know all of the uses there are for a computer until they own one. This problem is not as tough as it seems, however. The consumer should go to his local computer store, and look at the software that's available. Most programs explain their minimum hardware requirements right on the box. After looking at a few packages, it shoul .....

Get This Paper

Othello: Game Strategy
Number of words: 695 - Number of pages: 3

.... white, and the computer your seven whites black. Always play within your set "square". If you had on the bottom row 3 white, and on the second row 2 blacks, you would only play within that designated square, which is 3 x 3 stones. (see diagram.) This ensures that the computer can only play one stone past the square at any time, which will help you in predicting where the computer will move and a basic strategy. Always try to keep yourself to one move to win (if you could have two moves in a row, you would win something to zero.) Don't have long rows of white connecting to one .....

Get This Paper

The Introduction Of Computers In Education
Number of words: 754 - Number of pages: 3

.... Students are now doing the majority of their research in the comforts of home with less distraction. The software for PCs is extensive and the students can obtain all the information he/she needs for an assignment. The time that was spent running to the library has been cut by about ninety percent. This is due to the new and ever improving software that is produced for personal computers. Secondly, the computer has become a strong teaching tool in many schools across the nation and maybe the world. Since the introduction of computers in the classrooms, students have shown a progression o .....

Get This Paper

Technology In Our Society
Number of words: 833 - Number of pages: 4

.... is intolerance under certain circumstances. It is the individual patient who must make a decision about whether to keep himself alive. "What is the point of prolonging a person's biological life if it is obtained at the cost of a serious assault on that person's liberty?" There is probably no simple answer for this question. Any patient's decision should be respected, not based on the fact of all available technologies. This medical technology has the potential for both good and bad results. However, it is very important in today's society. "Insurance in the Genes" is a piece of valuable .....

Get This Paper

Virtual Reality
Number of words: 1559 - Number of pages: 6

.... of both the graphics-rendering hardware/software and the computer system itself. (Gump) There are four major types of devices currently in use: the head-mounted display (HMD), the binocular omni-oriented monitor (BOOM), the workstation "desktop" model (DEERING), and the projection model (CAVE). The HMD is a tracked helmet worn by the user that provides small television screens properly placed in front of the eyes. Although modest in comparison with other VR devices, it is not lightweight enough to prevent fatigue, and the screen resolution is typically medium at best. The BOOM also u .....

Get This Paper


« prev  13  14  15  16  17  next »

Copyright © 2024 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us