We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

Internet
Number of words: 1085 - Number of pages: 4

.... the comforts of home. I know that a young teenager can productively use this information. I have been using the net for about eight years for my reports and personal knowledge quests. My father would check on me every now and again to make sure I was on task. Not only was he keeping what I viewed pg13, he was helping me use different search engines and being my troubleshooter until I could surf the web by myself. Lots of the children now days are just tuned loose with a computer and not checked on until suppertime or bedtime. With that much freedom come temptation, this leads to the childre .....

Get This Paper

The Anti-Trust Case Against Microsoft
Number of words: 2573 - Number of pages: 10

.... more, until finally in August of 1993, (Check 1)the Federal Trade Commission decided to hand the case over to the Department of Justice. The Department of Justice moved quickly, with Anne K. Bingaman, head of the Antitrust Division of the DOJ, leading the way.(Check 1) The case was finally ended on July 15, 1994, with Microsoft signing a consent settlement.(Check 1) The settlement focused on Microsoft’s selling practices with computer manufacturers. Up until now, Microsoft would sell MS-DOS and Microsoft’s other operating systems to original equipment manufacturers (OEM’s) at a 60% d .....

Get This Paper

The Internet
Number of words: 1187 - Number of pages: 5

.... it. If one point in the network were blown up, the whole network would become useless. Paul Baran, one of the Rand thinkers on the project, conceived the idea for a new kind of communications network that wasn't organized point-to-point, but instead was set up more like a fishnet. He believed this structure could allow information to find its own path through the network even if a section had been destroyed. His eleven-volume report for the Pentagon was eventually shelved, but younger engineers realized that he had hit on an essential idea. Although Baran's ideas were overlooked at that t .....

Get This Paper

Microprocessors
Number of words: 2468 - Number of pages: 9

.... of a chip operate can be found in How Microprocessors Work. In their book, Wyant and Hammerstrom describe a microprocessor as a factory and all of the inner workings of the chip as the various parts of a factory (Wyant and Hammerstrom, 71-103). Basically a microprocessor can be seen as a factory because like a factory it is sent something and is told what to do with it. The microprocessor factory processes information. This most basic unit of this information is the bit. A bit is simply on or off. It is either a one or a zero. Bits are put into 8 bit groups called bytes. The numb .....

Get This Paper

The Internet Contributes To The Process Of Globalization
Number of words: 895 - Number of pages: 4

.... via the Internet illustrates the ability of the Internet to span the globe and in essence create a unified sense of shared memories. Furthermore it is immutable proof that the Internet is perhaps the most powerful tool of globalization It has been argued that the opening presumption that there exists a "coercive, sometimes wholly unconscious force of American imperialism over the Net." It's a statement that depends on some obsolete notions about the nation-state, propaganda, media, and imperialism. The Internet doesn't promote imperialism - it eradicates it. The underlying force thre .....

Get This Paper

Is Your Information Safe?
Number of words: 1521 - Number of pages: 6

.... and all are linked together via the Internet or other networks. More than a hundred million electronic messages travel through cyberspace every day, and every piece of information stored in a computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank robbers have become today's computer hackers. They can walk away from a computer crime with millions of virtual dollars (in the form of information they can use or sell for an enormous profit). Walking away is precisely what they do. The National Computer Crimes Squad estimates that 85-97 % of the time, theft of informati .....

Get This Paper

Cryptography
Number of words: 1227 - Number of pages: 5

.... to first understand what a hacker does and what a cracker does. A hacker likes to work with computers and tries hard to figure out how they work. A Cracker has malicious intent, a hacker may or may not intend to commit an act of fraud. It is possible to be a hacker and a cracker at the same time. Crackers like to break into systems for the pure joy of destroying. Some hackers have decided to help system administrators either make their system more secure or catch a person who has committed a computer crime. This is where I fit in I anonymously help others find security leaks and help them s .....

Get This Paper

Coputers In Modern Society
Number of words: 983 - Number of pages: 4

.... data about 4 times faster than conventional phone lines (about 28,000 bits per second has been quadrupled to about 128,000 bits per second. As speed enhances, memory and storage space is needed to hold excess information. EDO RAM is a new, faster memory module that helps transfer RAM data twice as fast as normal RAM. For long term storage of large amounts of data, hard drives have been under a constant upgrade of performance, and it is not uncommon to find hard drives about 8-9 gigabytes on the market. Along with technology, an ease of use factor has been instilled in the modern day .....

Get This Paper

Essay On Hacking
Number of words: 580 - Number of pages: 3

.... sometimes you type ftp:// before the name of the site. This simply means File transfer protocol. You use this when download image files or any other files. Now, onto hacking. Most people stereotype people simply as "HACKERS," but what they don't know is that there are three different types of computer whizzes. First, there are hackers. Hackers simply make viruses and fool around on the internet and try to bug people. They make viruses so simple. The get a program called a virus creation kit. This program simply makes the virus of beholders choice. It can make viruses that sim .....

Get This Paper

History Of The Computer Industry In America
Number of words: 2604 - Number of pages: 10

.... took place in 1694 when Blaise Pascal invented the first digital calculating machine. It could only add numbers and they had to be entered by turning dials. It was designed to help Pascal's father who was a tax collector (Soma, 32). In the early 1800, a mathematics professor named Charles Babbage designed an automatic calculation machine. It was steam powered and could store up to 1000 50-digit numbers. Built into his machine were operations that included everything a modern general-purpose computer would need. It was programmed by and stored data on cards with holes punched .....

Get This Paper


« prev  47  48  49  50  51  next »

Copyright © 2024 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us