We've Got Papers!
Find Your Term Paper:    
    NAVIGATE
  Home
  Join Now!
  Got Questions?
  Contact Us

    MEMBERS
  Username: 
  Password: 

    SUBJECTS
  Arts & Plays
  Biographies
  Book Reports
  Business
  Computers
  Creative Writing
  English
  Geography
  Health & Medicine
  History
  Legal & Government
  Miscellaneous
  Music
  Poetry & Poets
  Religion
  Science
  Social Issues


Term Papers on Computers

Computer Crime
Number of words: 2231 - Number of pages: 9

.... recklessly disrupts or degrades or causes the disruption or degradation of computer services or denies or causes the denial of computer services to an authorized user of a computer system. (e) Misuse of computer system information. A person is guilty of the computer crime of misuse of computer system information when: (1) As a result of his accessing or causing to be accessed a computer system, he intentionally makes or causes to be made an unauthorized display, use, disclosure or copy, in any form, of data residing in, communicated by or produced by a computer system. Penalties for com .....

Get This Paper

The Benefits Of Satellites
Number of words: 1495 - Number of pages: 6

.... as well as the time, anywhere in the world and works in all weather conditions. The GPS was initiated in 1973 by Navstar in the United States and then followed by the Soviet Union with their own GPS. Both GPS systems are free to use by anyone around the world and offers great benefits to the military, commercial companies and civilian residents. On the military side, the U.S. Air Force uses the GPS to test unmanned prototype aircraft’s like the X-22, which can prevent unnecessary human casualties. The GPS is also used in military submarines, Reconnaissance vehicles, jets and carrie .....

Get This Paper

The Evaluation Of The Microprocessor.
Number of words: 1306 - Number of pages: 5

.... very distinct qualities like 24-bit physical addressing and a 16-bit data bus. The original Apple Macintosh ,released in 1984, had the 8-MHz found at the core of it. It was also found in the Macintosh Plus, the original Macintosh SE, the Apple Laser-Writer IISC, and the Hewlett-Packard's LaserJet printer family. The 68000 was very efficient for its time for example it could address 16 megabytes of memory, that is 16 more times the memory than the Intel 8088 which was found in the IBM PC. Also the 68000 has a linear addressing architecture which was better than the 8088's segmented memory .....

Get This Paper

Manual Labor To Industrial Automation
Number of words: 399 - Number of pages: 2

.... to occur on such a drastic scale, but it has happened to millions of hard working people. One concern is what the people as a whole going to do about losing their jobs. The only real answer to this problem may not be determined for years to come. As automation continues to grow, many people will be negatively affected. My feeling on the entire picture is spit both ways. On the one side, many applications for a machine exist, which man cannot perform. I know that I would not want to be the person that has to tell the people that they are going to lose their jobs to automation. I am .....

Get This Paper

Contrasting The Two Forms Of Mail
Number of words: 847 - Number of pages: 4

.... gifts or magazines cannot be attached to e-mail. On the other hand, the postal service can send any kind of physical package, from a magazine to a pool table, for a price proportional to its size. In addition, the postal service can also transfer data if it is placed on a disk or a CD-ROM. However, speed is a problem, thus origin of the term snail-mail. For example, The smallest letter can take from two days to two weeks to deliver, depending on the locations of the sender and the receiver. Even sending a letter to the house across the street takes time due to unnecessary movement. The mail .....

Get This Paper

Importance Of Computer Software In Education
Number of words: 571 - Number of pages: 3

.... for the first time through games and other software. These help develop the ability to make quick and concrete decisions. The next step requires them to think more seriously about the machines. Secondary students learn the first steps in computer programming by creating simple programs. Here, the assistance of useful software is necessary. The computer software has many uses in the real world and is found virtually everywhere. The new generation of very fast computers introduces us to a new type of software. Multimedia is an important part of computer program that not only delivers w .....

Get This Paper

Computers 2
Number of words: 1207 - Number of pages: 5

.... If anyone has ever been on the Internet; they know that it is a major contributor to this. Instead of companies paying around 1 million dollars to advertise for a 30 second commercial during the Super Bowl; they could just pay a certain amount to be advertised forever on the net. People can also notice the changes of advertising on the T.V., also. Not until the last few years have people noticed that a great deal of the commercials on T.V. are computer-related. These two combined have made the advertising businesses boom. Not only just on the T.V., but also on the net. Another area a .....

Get This Paper

Censorship On The Internet
Number of words: 3158 - Number of pages: 12

.... (Rosen 16). Things have changed drastically since then with over a million different sites available to access porn. Now it is not just for adults. Children are accessing the obscene materials. This brings rise to issues of how to protect them from problems that can arise. The materials they view, could influence children. They could also be subjected to cybersex in a chat room full of people that could be three times their age. Worst of all pedophilias could influence children to meet with them outside of the computer. The government and the United States citizens must now figure out how .....

Get This Paper

Biometric Systems
Number of words: 484 - Number of pages: 2

.... are growing rapidly. For example, biometric identification cards are being used at a university in Georgia to allow students to get their meals, and in a Maryland day care center to ensure that the right person picks up the right child. In Los Angeles, they are using fingerprints to stop welfare fraud. And they're also being used by frequent business travellers for rapid transit through immigration and customs in Holland, and now at JFK and Newark airports in the United States. It could also be used to simply prevent one employee from "punching in" for some one else, or to prevent someone fr .....

Get This Paper

Computers And Crime
Number of words: 1866 - Number of pages: 7

.... different from 'normal' individuals, but that is not the case."(Sharp, 18:3) It is believed that the computer criminal "often marches to the same drum as the potential victim but follows and unanticipated path."(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall. Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. "When computers were first introduced into businesses, computer crime was defined simply as a .....

Get This Paper


« prev  63  64  65  next »

Copyright © 2025 Got Papers.com. All rights reserved.
Home | Forgot Password | Cancel Subscription | Contact Us