We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

Local Area Networks
Number of words: 876 - Number of pages: 4

.... area such as a single office building, warehouse, or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN enables stations to communicate directly using a common physical medium on a point-to-point basis without any intermediate switching node being required. There is always need for an access sublayer in order to arbitrate to access to the shared medium. The network is generally owned, used, and operated by a single organization. This i .....

Get This Paper

Censorship And The Internet
Number of words: 2785 - Number of pages: 11

.... law seems somewhat harmless at a first glance until you begin to read some of its clauses. One of the biggest groups that combated this issue was the CIEC, or Citizens Internet Empowerment Coalition. The CIEC soon began to find problems with this bill as the so maticulously stated on their web site "It is also important to note that the CDA is not about child pornography, obscenity, or using the Internet to stalk children. These are already illegal under current law."(CIEC) The article then states "instead, the CDA prohibits posting "indecent" or "patently offensive" materials in a publi .....

Get This Paper

What Is An Information Systems Project
Number of words: 509 - Number of pages: 2

.... management and people skills are a must to be a successful project manager. 2. Stud the enclosed article “HOW MUCH TECHNICAL TRAINING DOES A PROJECT MANAGER NEED?” Then, answer the question, supporting your answer. For support, you are not limited to the enclosed article. As stated in the article a project manager needs enough knowledge not to be snowed. In the military commissioned officers are put into positions that they have little or knowledge of. These Officers are placed there for leadership. To take ideas from their subordinates make the ideas into a singe objective and co .....

Get This Paper

Cognitive Artifacts & Windows 95
Number of words: 854 - Number of pages: 4

.... the errors that could occur in configuring the task yourself. The wizard performs all the functions on its little to-do list without having the user worrying about whether he/she remembered to include all the commands. On the side of personal views the user may see the wizard as a new task to learn but in general it is simpler than having to configure the application yourself and making an error, that could cause disaster to your system. The wizard also prevents the user from having to deal with all the internal representation of the application like typing in command lines in the syst .....

Get This Paper

Computer Mouse
Number of words: 646 - Number of pages: 3

.... Xerox Palo Alto Research Center. Alan Day developed the first working computer that used the . While at the research center Day and other researches developed the first computer that depended on the to point. The next advancement for the came out of the Apple computer. The Apple Lisa computer used a graphical user interface and it helped create the technology used for the . The Macintosh computer used a and it simplified the use of the computer because all you had to do was point and click. The windows based systems and Macintosh all used the . The growing computer market and its .....

Get This Paper

Internet Access: Flat Fee Vs. Pay-Per-Use
Number of words: 1687 - Number of pages: 7

.... at in a magazine or newspaper. Yet many of the most interesting things we learn about or find come from following unknown routes, bumping into things we weren't looking for. (Indeed, Thomas Kuhn makes the claim that, even in the hard sciences, real breakthroughs and interesting discoveries only come from following these unconventional routes [Kuhn, Thomas, The Structure of Scientific Revolutions, Chicago: University of Chicago Press, 1962]). And people who have to pay each time they use a piece of information are likely to increasingly rely upon specialists and experts. For example, .....

Get This Paper

Virtual Reality - What It Is And How It Works
Number of words: 752 - Number of pages: 3

.... order to create this alternate reality, however, you need to find ways to create the illusion of reality with a piece of machinery known as the computer. This is done with several computer-user interfaces used to simulate the senses. Among these, are stereoscopic glasses to make the simulated world look real, a 3D auditory display to give depth to sound, sensor lined gloves to simulate tactile feedback, and head-trackers to follow the orientation of the head. Since the technology is fairly young, these interfaces have not been perfected, making for a somewhat cartoonish simulated reality. .....

Get This Paper

Computer Security
Number of words: 2496 - Number of pages: 10

.... could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, hackers are not so dangerous at all. Th .....

Get This Paper

A Long Way From Univac
Number of words: 1474 - Number of pages: 6

.... and 8088 microprocessor chips, made by a Intel, a Hillsboro, Oregon company. When IBM¹s computer¹s design had been finalized, they shared most of the inner workings of the computer with everyone. IBM hoped that this would encourage companies to manufacture computers that were compatible with theirs, and that in turn, would cause software companies to create operating systems, or OS, and other programs for the ³IBM Compatible² line of computers. One of the computer manufacturers was a Texas company called Compaq. A company called Dell Computers was the first ³factory direct² compute .....

Get This Paper

Computer Crime
Number of words: 465 - Number of pages: 2

.... commit thesis crimes, because they where carious and wanted to explore the system. All they want to do is exploit systems not destroy it. It is purely intellectual. I know one reason is that is can be very rewarding. Hackers are drawn to computers for the aninymity they allow. They feel powerful and can do anything. Hackers can be there own person out side the real world. I found out Arizona was the first state to pass a law against computer crime, in 1979. In 1980 the U.S. copyright act was amended to include soft ware. I found out that in 1986 a computer farad abuse act was pas .....

Get This Paper


« prev  19  20  21  22  23  next »

Copyright © 2024 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us