We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

Object Oriented Analysis
Number of words: 666 - Number of pages: 3

.... System Specification, introduced model-based software engineering. Demarco thought that complex software systems should be built like any large, complex engineering system, by first building working paper models of the system before committing the resources for implementation. This allowed the user to visualize the future system. Most modern approaches have integrated some form of Demarco’s philosophy. The variation in approaches is based on the kinds of models that should be built, how they should be built, and who should build them. A generic model-based software-engineering life .....

Get This Paper

Semiconductors : The Silicon Chip
Number of words: 1438 - Number of pages: 6

.... diodes (LED), photosensors, strain gages, solar cells, charge transfer devices, radiation detectors and a variety of other devices. Silicon belongs to the group IV in the periodic table. It is a grey brittle material with a diamond cubic structure. Silicon is conventionally doped with Phosphorus, Arsenic and Antimony and Boron, Aluminum, and Gallium acceptors. The energy gap of silicon is 1.1 eV. This value permits the operation of silicon semiconductors devices at higher temperatures than germanium. Now I will give you some brief history of the evolution of electronics which wil .....

Get This Paper

Computer Security
Number of words: 2495 - Number of pages: 10

.... coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, hackers are not so dangerous at all. They just stole computer time from the university. Ho .....

Get This Paper

Truth And Lies About The Computer Virus
Number of words: 1126 - Number of pages: 5

.... harmful is that the anti-virus companies could write viruses in order to sell their programs. Software companies have and do distort the truth about viruses. "Antivirus firms tend to count even the most insignificant variations of viruses for advertising purposes. When the Marijuana virus first appeared, for example, it contained the word "legalise," but a miscreant later modified it to read "legalize." Any program which detects the original virus can detect the version with one letter changed -- but antivirus companies often count them as "two" viruses. These obscure differentiatio .....

Get This Paper

Ethics In Cyberspace
Number of words: 940 - Number of pages: 4

.... intellectual property 7) respect the privacy of others 8) honor confidentiality. The very nature of electronic communication raises new moral issues. Individuals and organizations should be proactive in examining these concerns and developing policies which protect liabilities. Issues which need to be addressed include: privacy of mail, personal identities, access and control of the network, pornographic or unwanted messages, copyright, and commercial uses of the network. An Acceptable Use Policy (AUP) is recommended as the way an organization should inform users of expe .....

Get This Paper

Osi Model
Number of words: 583 - Number of pages: 3

.... and, at the other end, when the message arrives, another flow of data up through the layers in the receiving computer. The actual programming and hardware that makes these seven layers of function is usually a combination of the computer OS, applications, TCP/IP and the software and hardware that enable you to put a signal on one of the lines attached to your computer. OSI divides communication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lower three layers are used when any message passes through the host co .....

Get This Paper

Computer Programming
Number of words: 631 - Number of pages: 3

.... by a reasonably sophisticated end user. The main disadvantage is that RAD tools often require code to be written, which will result in most developers probably having to learn to program using the underlying programming language, except in the case of the simplest applications. The time gained from using a RAD tool can be immense, however: Programmers using IBM's VisualAge report the ability to create up to 80 percent of an application visually, with the last 20 percent consisting of specialized functions, which means by using and IBM program it is much easier because most of the progr .....

Get This Paper

Get Informed! - Buying The Right Computer
Number of words: 801 - Number of pages: 3

.... drive space you need. The bigger the program, the more space it takes to save physically. I wouldn't suggest buying anything under a 2 geg hard drive. Why? Because by the time you load you system (Windows95, DOS) and other software; your hard drive is already filled up. How are you going to save your document you wrote in WordPerfect when your hard drive is full? It's usually cheaper in the long run to buy the biggest hard drive available. Plus, you always want to have room for your games. After all, who wants to spend their whole life working? As far as processors, I suggest the .....

Get This Paper

Investigative Report Of Internet Addiction
Number of words: 3525 - Number of pages: 13

.... The percentage of the Internet domains 3. Will the equation people = Internet Users be true in 2001? ABSTRACT The problem of Internet addiction is not very noticeable now and that's why not many people are taking it seriously, but what these people are failing to see is the connection between the very rapid growth of the Internet and the addiction problem. It is really simple logic the bigger the Internet get the more users will be which will lead to a bigger number of addicts that can have their lives as well as others corrupted by this behavior. The main objective of this paper is .....

Get This Paper

Technological Developments
Number of words: 973 - Number of pages: 4

.... in Ted Mooney\'s 1981 novel, Easy Travel to Other Planets. There, Mooney describes \"A Case of Information Sickness\" in the following terms: If information was once considered the solid ground, the \"factual\" basis, on which to make decisions and take actions, it no longer seems to be so. Indeed, information no longer seems to be solid at all. Not only does it not provide a grounding, a foundation, from which to see, know, or act, it comes to be seen as obscuring our vision, our attempts at knowledge, our ability to control the forces of the world. Information, it might be argue .....

Get This Paper


« prev  25  26  27  28  29  next »

Copyright © 2024 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us