We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?
Number of words: 1288 - Number of pages: 5

.... break-ins and criminal activity, have become fairly common occurrences in both commercial and academic circles. Hackers are becoming more common, and quickly learning new techniques and methods, which no longer leave computer systems as 'safehouses'. The question of "what kind of person is a Hacker?" cannot be answered simply. Hackers vary in race, style and preference. Since every person is different, therefore so are hackers, "Each Hacker has their own style and methods" (Rootshell). According to the Hackers Code of Ethics, a true Hacker is one who shares: 1 The belief that .....

Get This Paper

Artificial Intelligence
Number of words: 2749 - Number of pages: 10

.... such as automated banking transactions, telephone transactions , and home banking activities. This study focuses on academic research in neural network technology . This study was funded by the Banking Commission in its effort to deter fraud. Overview Recently, the thrust of studies into practical applications for artificial intelligence have focused on exploiting the expectations of both expert systems and neural network computers. In the artificial intelligence community, the proponents of expert systems have approached the challenge of simulating intelligence differently th .....

Get This Paper

Webhosting For An Online Store
Number of words: 667 - Number of pages: 3

.... an e-commerce site to that of a fire for a traditional store, and would expect that a similarly high proportion of Web stores would go out of business as a result. I guess that most Web merchants are complacent, either assuming that they will never have to change hosts or that if they do it will be a straightforward matter. However, the truth is that changing your Web hosting service can be very difficult, particularly for e-commerce sites because the software the store runs on - whether CGI scripts or a fully-fledged Web commerce server - needs to be moved as well. So how do you go about .....

Get This Paper

Advancement Of The Computer
Number of words: 604 - Number of pages: 3

.... were down and not running for most of the time. But these new machines were big news to the public. The media became very interested in them. They wrote about them in newspapers and magazines calling them “electronic brains” That will change the world. In 1953 IBM realized that a market existed for business computers. They introduced a total of 19 of these computers for businesses. The computers were very large, expensive, and needed a large staff of professional people just to run them. Punch cards were used to give the first generation computer data and instructions. The second gene .....

Get This Paper

Private Cable TV
Number of words: 3180 - Number of pages: 12

.... they political, financial or cultural? We will try to answer these questions in our paper. But we will first define the different technical terms that we are going to focus on. Then we will developp the birth of private channels, their regulations, laws and financing in the different countries. 2. BASICS In our paper you will find the following technical terms: ¥ terrestrial broadcasting: this is the basic technology used to broadcast radio and TV. It«s the use of radio-frequencies that can be received by a simple antenna. The problem by using terrestrial broadcasting is, that you onl .....

Get This Paper

Floating Point Coprocessors
Number of words: 2861 - Number of pages: 11

.... require a minimum overhead in terms of both hardware and software. There are various techniques of arranging a coprocessor alongside a microprocessor. One technique is to provide the coprocessor with an instruction interpreter and program counter. Each instruction fetched from memory is examined by both the MPU and the coprocessor. If it is a MPU instruction, the MPU executes it; otherwise the coprocessor executes it. It can be seen that this solution is feasible, but by no means simple, as it would be difficult to keep the MPU and coprocessor in step. Another technique is to equip the micr .....

Get This Paper

Internet, Its Effects In Our Lives And The Future Of The Internet
Number of words: 5816 - Number of pages: 22

.... the power of the Internet. For many businesses the Internet is becoming integral to their operations. Imagine the ability to send and receive data: messages, notes, letters, documents, pictures, video, sound- just about any form of communication, as effortlessly as making a phone call. It is easy to understand why the Internet is rapidly becoming the corporate communications medium. Using the mouse on your computer, the familiar point-and-click functionality gives you access to electronic mail for sending and receiving data, and file transfer for copying files from one computer to another. .....

Get This Paper

Cyberspace And The American Dream: A Magna Carta For The Knowledge Age
Number of words: 4350 - Number of pages: 16

.... of physical resources -- has been losing value and significance. The powers of mind are everywhere ascendant over the brute force of things. In a First Wave economy, land and farm labor are the main "factors of production." In a Second Wave economy, the land remains valuable while the "labor" becomes massified around machines and larger industries. In a Third Wave economy, the central resource -- a single word broadly encompassing data, information, images, symbols, culture, ideology, and values -- is actionable knowledge. The industrial age is not fully over. In fact, classic Second Wa .....

Get This Paper

Hacking
Number of words: 999 - Number of pages: 4

.... a working computer virus (Ash, 5-6). The formula that a hacker follows to hack is always the same. First, the hacker runs the prefix scanner, usually at night, to get a list of dial-ups, phone numbers that contain carriers. Once he has dials-ups, he has places to explore. Next he uses his terminal to dial-up the carriers. When he connects to the network, he will need to gain entrance to it. The hacker uses his password cracker to find a suitable user name and password. The password cracker does not always work, so the hacker is forced to use a technique called "brute force" . This i .....

Get This Paper

BlueTooth
Number of words: 745 - Number of pages: 3

.... devices equipped with this new technology. opens us up to a new level of data communications. By making it possible to communicate wirelessly to any device equipped with a chip. Mobile phones can communicate with lap top computers, digital daily planners can be linked to personal computers and have e-mail down loaded to them the moment it is sent a multitude of possibilities are born. works on a 24.5 GHz ISM "free band" which means that there is no restrictions for travelers using enabled equipment. For transmission of information between enabled devices there is no necessary "line .....

Get This Paper


« prev  59  60  61  62  63  next »

Copyright © 2025 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us