We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

Linux Operating System
Number of words: 998 - Number of pages: 4

.... for Linux because it must be 30-40 MB. Also, it has firewall system to protect the network from hackers. This minimizes the number of viruses capable of affecting a Linux system. If we think about it, there are many viruses for Windows that can harm your system. Linux is a stable Operating System. You can kill an individual process that is not replying with kill command vs. shutting down your system in Windows. Linux has true multitasking properties. You can run up to twelve processes at the same time with no performance loss. Microsoft claims that Windows has the capability of mul .....

Get This Paper

How Cell Phones Work
Number of words: 999 - Number of pages: 4

.... cell phones incredible range. A walkie-talkie can transmit perhaps a mile. A CB radio, because it has much higher power, can transmit perhaps 5 miles. Someone using a cell phone, on the other hand, can drive clear across a city and maintain a conversation the entire time. Cells are what give a cell phone its incredible range (Anonymous #2). The genius of the cellular system is the realization that a city can be chopped up into small cells, and that the cells allow extensive frequency reuse across a city. Frequency reuse is what lets millions of people own cell phones without problems. It wo .....

Get This Paper

Computer Security
Number of words: 2026 - Number of pages: 8

.... the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, hackers are not so dangerous at all. They just stole computer time from the u .....

Get This Paper

The Bulgarian And Soviet Virus Factories
Number of words: 9220 - Number of pages: 34

.... author had completely missed the fact that the majority of PC users are not experienced programmers. A few months later, in the fall of the same year, two men came in the editor's office of the magazine and claimed that they have found a computer virus. Careful examination showed that it was the VIENNA virus. At that time the computer virus was a completely new idea for us. To make a computer program, whose performance resembles a live being, is able to replicate and to move from computer to computer even against the will of the user, seemed extremely exciting. The fact that "it can be do .....

Get This Paper

Computer Crime 3
Number of words: 897 - Number of pages: 4

.... and mischief, all which are easily defined and subject to criminal sanctions. The computer has also brought along with it a host of potentially new misuses or abuses that may, or should be criminal as well. The problem with today’s computer crimes are that the criminal justice systems have not been able to keep up with the technological change. Only a few countries have adequate laws to address the problem, and of these, not one has addressed all the legal, enforcement and prevention problems. The problem with the legal system is that it has always been a system with limits. The .....

Get This Paper

Speech Recognition Technology
Number of words: 2718 - Number of pages: 10

.... that already utilize speech recognition are Charles Schwab & Co., American Express, United Airlines, NationsBank, United Parcel Service, British Airways, and Sears Roebuck and Co. These companies focus on the fastest growing parts of the speech market, where the caller's voice replaces punching in letters and numbers on the telephone keypad. The other applications of speech technology are for the use of consumers. The users' voice can give computer commands as well as dictate speech into text. All operating systems used today are Graphic User Interfaces (GUI's), but "future computers wil .....

Get This Paper

Internet Site Evaluations
Number of words: 2253 - Number of pages: 9

.... is not a reliable idea. Why? Because the authorship of the source, probably the most important criterion one must use in evaluating the effectiveness of a website, is sometimes debatable. The author of a website can be anyone. It can be ones next door neighbour, someone whom was met last week at a bar or a world renowned open heart surgeon who was on television just three days ago. Before beginning to delve into a site, make sure that authorship meets one of two sub-criterion: if reviewing a site in ones own general area of expertise, be certain that the author is a trusted and wel .....

Get This Paper

Where Did UNIX Come From And Why Are There Different Versions Of UNIX?
Number of words: 276 - Number of pages: 2

.... multi-tasking small operating system and they chose the name UNIX. Their initial goal was simply to operate their DEC PDP machines more effectively. In 1971, UNIX became multi-user and multi-tasking, but it was still just being developed by a small group of programmers who were trying to take advantage of the machines they had at hand. (In other words, this operating system that they were developing did not run on any machine made by Bell!) In 1973, Dennis Ritchie rewrote the UNIX operating system in C (a language he had developed.) And in 1975, the portability of the C programmin .....

Get This Paper

Natural Language Processing
Number of words: 1914 - Number of pages: 7

.... applied, accurate Natural Language Processing will exist. Alan Turing predicted of NLP in 1950 (Daniel Crevier, 1994, page 9): "I believe that in about fifty years' time it will be possible to program computers .... to make them play the imitation game so well that an average interrogator will not have more than 70 per cent chance of making the right identification after five minutes of questioning." But in 1950, the current computer technology was limited. Because of these limitations, NLP programs of that day focused on exploiting the strengths the computers did have. For example, a .....

Get This Paper

Censorship Online
Number of words: 500 - Number of pages: 2

.... cost of s descent system and software and the technology that moves at lightning speed. The computer you buy tomorrow will not be able to handle any of the new software two years from now. Owners must not only keep up with the new trends but must also be well aware of what their own system can sustain so that they do not overload it and cause it to crash. This article focuses on interactive video, which is a relatively new field in the gaming industry. The games that have been on the market have not lived up to the bombardment of advertising gamers have been subjected to. The vide .....

Get This Paper


« prev  2  3  4  5  6  next »

Copyright © 2024 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us