We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

Technology 2
Number of words: 1415 - Number of pages: 6

.... homes had a PC (Shelly, Cashman,& Waggoner, 138). Computers are easy to use when you know how they work and what the parts are. All computers perform the four basic operations of the information processing cycle: input, process, output, and storage. Data, any kind of raw facts, is required for the processing cycle to occur. Data is processed into useful information by the computer hardware. Most computer systems consist of a monitor, a system unit which contains the Central Processing Unit (CPU), a floppy-disk drive, a CD-ROM drive, speakers, a keyboard, a mouse, and a printer. Each com .....

Get This Paper

Using Electronic Mail To Communicate With The Staff
Number of words: 1248 - Number of pages: 5

.... enrolling in the CareLink program. If documentation is not available the patient will be denied membership. (Simmons, Mrs. Juanita to Member Service & Education staff. 13 June 1998. Process Change - Residency Issue.) The communication effort failed via memo in this situation. The memo was typed and distributed June 13th. The only time the ten Member Service Representative received their correspondence is when they need to come in for our monthly staff meeting. Unfortunately July's staff meeting was not held until the second Friday of that month due to the first Friday being July 4th .....

Get This Paper

The Year 2000 Problem
Number of words: 2118 - Number of pages: 8

.... after ‘99’, the only logical choice is to reset the number to ‘00’. is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. “Time is running out- the Year 2000 is inevitable! The problem will occur simultaneously worldwide, time zones withstanding. It affects all languages and platforms, hardware & software. The demand for solutions will exceed the supply. Survivors will survive big, losers will lose big. There is no ‘silver bullet’ that is going to fix things” (Adams 2). “It is too big and too overwhelmin .....

Get This Paper

The Internet
Number of words: 1878 - Number of pages: 7

.... had a solution. They would create a non-centralized network that linked from city to city, and base to base. The network was designed to function when parts of it were destroyed. The network could not have a center because it would be a primary target for enemies. In 1969, ARPANET was created, named after its original Pentagon sponsor. There were four supercomputer stations, called nodes, on this high speed network. ARPANET grew during the 1970's as more and more supercomputer stations were added. The users of ARPANET had changed the high speed network to an electronic post office. Sc .....

Get This Paper

Bridge Structures
Number of words: 485 - Number of pages: 2

.... roman bridges, however usually have a level road supported on one or more semicircular stone arches. One of the most famous bridges would be The Pont du Gard at Nimes, France. It has three tiers of arches rising 155 feet above the Gard River, spans a distance of 855 feet. It was built in the late 1st century BC or the early 1st century AD. The cantilever bridge is characterized by spans that are supported not at the ends but near the center of the grider or truss. A suspension bridge 1010 feet long was designed and constructed by the German-American engineer John Roebling over the Oh .....

Get This Paper

Definition Of An IP Address
Number of words: 213 - Number of pages: 1

.... which is referred to as the domain name , and a number ( 198.137.240.100 ) , which is generally referred to as the IP address or IP number. Most likely, the InterNIC will assign you a Class C address, which consists of 255 unique IP numbers for you to assign to your employees. If you need more than 255 IP address, you can apply for a Class B address, which will give you over 65,000 unique IP addresses. Class A addresses are for very large companies. Both Class A and Class B addresses are very hard, if not impossible, to get. Usually, companies will get multiple Class C addresses. I .....

Get This Paper

Catalytic Converters
Number of words: 591 - Number of pages: 3

.... catalyst. This forces a reaction between the carbon monoxide and hydrocarbons with the oxygen inside the converter creating products of carbon dioxide and water vapor. The reaction which occurs inside the converter is as follows: The main compounds involved are carbon monoxide and hydrocarbons (compounds of hydrogen and carbon), as well as oxygen. When these three are combined with the provided catalyst, a reaction occurs as above. During the reaction the oxygen splits apart the carbon monoxide and the hydrocarbons and allows them to combine with its elements forming the aforementio .....

Get This Paper

Computer Ergonomics In The Work Place
Number of words: 3244 - Number of pages: 12

.... this body of knowledge to the design of tools, machines, systems, tasks, jobs, and environments for safe, comfortable and effective human use."(BCPE, 1993) In the average computer workstation, employees are prone to over a dozen hazards. There exist two factors that can prevent this: forming good work habits and ergonomically designed computer workstations. We will discuss these preventions throughout the paper. First, a few terms may need defining. Repetitive Strain Injuries (RSI) takes place from the repeated physical movements of certain body parts which results in damage to tendons, .....

Get This Paper

What Really Is A Hacker?
Number of words: 409 - Number of pages: 2

.... it not only could infringe upon people's right to privacy, but give up trade secrets as well. A deep mistrust of authority, some hackers consider authority to be a constriction force. Not all hackers believe in this ethic, but generally authority represents something that would keep people from being able to have full access and/or free information. Along with the "ethical code" of hackers there are a few basic "hacking rules" that are followed, sometimes even more closely then there own code. Keep a low profile, no one ever suspects the quite guy in the corner. If suspected, keep .....

Get This Paper

Computer System Analysts
Number of words: 1669 - Number of pages: 7

.... manufacturing and distribution sales systems. This analysis will describe the typical responsibilities of the computer systems analyst, including the job market and outlook for the career that may be one of the most misunderstood occupations in modern times. The computer systems analysts is often misunderstood because they speak a techno-language that sounds more Greek than Greek, with common words like Sat, FoxPro, VB-4, C++ Himmelberg (8G), often leaving non-analysts scratching their heads. However, the development of efficient software and hardware systems is an increasingly essent .....

Get This Paper


« prev  5  6  7  8  9  next »

Copyright © 2024 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us