We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

The Torpedoes
Number of words: 356 - Number of pages: 2

.... noise after a run of 400m from its launch. This often proved to be the U-boat itself and standard issue-orders were to dive immediately to depth of 60m after launch from a bow tube while a stern shot was to be followed by a complete silence in the boat. Two U-boats were almost certainly lost when hit by one of their own T5 torpedoes, U-972 in Dec 1943 and U-377 in Jan 1944. Variants All the German U-boat torpedoes were 53.3cm (21 inch) in diameter and had a warhead of 280kg. (The T5 had two important pattern-running devices, which could be applied to various torpedo types. These w .....

Get This Paper

Modems
Number of words: 467 - Number of pages: 2

.... have 14.4 or 28.8 baud (Baud is "Slang" for Baud Rate Per Second) the reason for the increase in 14.4 and 28.8’s is that they are cheap and fairly recent and haven’t gone out of date yet. There are two types of modem external and external internal plugs into a 16 bit port inside your computer and external connects through either a serial (mouse)port or a parallel (printer)port most people like the external because they don’t take up an extra space in your computer (according to PC Computing) prices in range price from $100 (28.8bps) to $500(software upgradable 56k). Facsimile mach .....

Get This Paper

Holograms
Number of words: 1070 - Number of pages: 4

.... in 3-D. You can look around objects, too -if the apple is blocking the view of an orange behind it, you can just move your head to one side. The apple seems to "move" out of the way so you can see the orange or even the back of the apple. If that seems a bit obvious, just try looking behind something in a regular photograph! You can't, because the photograph can't reproduce the infinitely complicated waves of light reflected by objects; the lens of a camera can only focus those waves into a flat, 2-D image. But a hologram can capture a 3-D image so .....

Get This Paper

Reality - What It Is And How It Works
Number of words: 3113 - Number of pages: 12

.... order to create this alternate reality, however, you need to find ways to create the illusion of reality with a piece of machinery known as the computer. This is done with several computer-user interfaces used to simulate the senses. Among these, are stereoscopic glasses to make the simulated world look real, a 3D auditory display to give depth to sound, sensor lined gloves to simulate tactile feedback, and head-trackers to follow the orientation of the head. Since the technology is fairly young, these interfaces have not been perfected, making for a somewhat cartoonish simulated reality .....

Get This Paper

Victims In Progress Of Technology
Number of words: 301 - Number of pages: 2

.... countries is to gain access to their resources. Technological cultures are ones of mass consumption. As we have learned over the past few decades, are resources are limited and must be conserved properly. Tribal societies are a shining example of how to manage these resources, because they only use and eat what they need without wasting valuable resources. To demonstrate let us examine Bodley's study of the Maori tribe. The Maori tribe, settled in New Zealand during the age of expansion, allowed and even aided settlers in colonizing on the island. As the number of white settlers grew, .....

Get This Paper

Computer Crime Is Increasing
Number of words: 1410 - Number of pages: 6

.... computer to steal or alter valuable information from an employer. Variety and Extent Since the first cases were reported in 1958, computers have been used for most kinds of crime, including fraud, theft, embezzlement, burglary, sabotage, espionage, murder, and forgery. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses i.e. persons with the requisite skills, knowledge, access, and resources. Much of known computer crime has consisted of entering false data into computers. This method of computer crime is simpler and .....

Get This Paper

An Insight Into Virtual Reality
Number of words: 1304 - Number of pages: 5

.... extension, hand position and orientation. Connected to a computer through fiber optic cables. Sensor inputs enable the computer to generate an on screen image of the hand that follows the operator's hand movements. The glove also has miniature vibrators in the finger tips to provide feedback to the operator from grasped virtual objects. Therefore, driven by the proper software, the system allows the rator to interact by grabbing and moving a virtual object within a simulated room, while experiencing the "feel" of the object. The virtual reality line includes the Datasuit and the Eyepho .....

Get This Paper

Coping With Computers
Number of words: 491 - Number of pages: 2

.... technologies range from the terminals of the 1970's all the through today with the Internet and e-mail. One of her first experiences with a computer involved sending a message over the AP news wire. As it turns out, she expressed her candid opinion on some very sensitive topics at the time, including but not limited to the Vietnam War. Consequently, the AP was not amused with the message and she was fired. At the time, this incident was popular enough to make it into Newsweek magazine. Later on, she moved into television as a reporter, but now owns her own production company, Lucky Duck .....

Get This Paper

Morality And Ethics And Computers
Number of words: 1652 - Number of pages: 7

.... society to answer. There are also many moral and ethical problems dealing with the use of computers in the medical field. In one particular case, a technician trusted what he thought a computer was telling him, and administered a deadly dose of radiation to a hospital patient.2 In cases like these, it is difficult to decide who's fault it is. It could have been the computer programmer's fault, but Goodman asks, "How much responsibility can you place on a machine?"3 Many problems also occur when computers are used in education. Should computers replace actual teachers in the clas .....

Get This Paper

Media Influence
Number of words: 382 - Number of pages: 2

.... and the NATO's attack. (Johanna Mcgeary, Standoff in Kosovo,Time weekly news magazine, March 29,1999) A person who doesn't know anything about the Kosovo events and read Johanna Mcgeary will hate from Yugoslav President Slobodan Milosevic . Most of the people who read this media item may feel hostility to the Serbs and may try to help Muslims. And also support the NATO's attacked. As a result this article can be very effective article for the Muslims. Nowadays Kosovo events have a big place on the mass media. CNN shows the bombing frames all the time, and the crying little Albanian .....

Get This Paper


« prev  26  27  28  29  30  next »

Copyright © 2024 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us