Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Software Piracy: A Big Crime With Big Consequences
[ view this term paper ]Words: 2190 | Pages: 8

... and widespread crime that must be acknowledged and dealt with. Software piracy is the unauthorized duplication and or distribution of copyrighted programs. There are two ways to be involved in software piracy. The first is facilitation. Facilitation is the deliberate copying of copyrighted software and distributing it. An example would be an MIT student named David LaMacchia. This individual served and maintained a computer that was connected to the internet that offered it's users more than one million dollars worth of software 'free of charge.' Mr. LaMacchia was caught by the authorities and was ac ...




Parts Of A Computer And What They Do
[ view this term paper ]Words: 2549 | Pages: 10

... a pad. Hard contact: When the key is pressed to conectors are pressed together forming a physical conection creating a current. The key board has in side it a small microprocessor this will scan the keyboard once every millisecond to check for changes in the current when the key is pressed the processor finds that the current has increased and reacts accordingly and the same when the current is depressed and the current decreases. Over the years many new types of keyboard have been thought up these are mostly more ergonomically designed than there older counter parts this is done in ord ...




A Long Way From Univac
[ view this term paper ]Words: 1474 | Pages: 6

... to be the first personal computer, the Apple II. This computer was introduced on April 16, 1977, at the First West Coast Computer Faire, in San Francisco. In 1981, the International Business Machines Company introduced the first IBM PC. Unlike Apple, IBM used a policy of open architecture for their computer. They bought all of their components from the lowest bidder, such as the 8086 and 8088 microprocessor chips, made by a Intel, a Hillsboro, Oregon company. When IBM¹s computer¹s design had been finalized, they shared most of the inner workings of the computer with everyone. IBM hoped that this wou ...




Identity Theft
[ view this term paper ]Words: 696 | Pages: 3

... a tourast trap so to speak where nameless faceless conartists work the crowds. Ghosts.Anybody can fall victem to a ghost. Nobody is really truely safe because our personal information is distrubted like candy on halloween. We use our social security numbers as identification numbers Credit card numbers are printed on every receipt. And our liscense number is used on a daily basis. Despite this there are ways to prevent yourself from falling victem to identity theft. you see a criminal likes easy prey. They don't want to have to work for it. It's like locking your car at the mall, sure someone might break ...




Escapism And Virtual Reality
[ view this term paper ]Words: 4882 | Pages: 18

... of human life has continued unabated since the medieval watchmakers of Europe and the Renaissance study of science that followed Clocks . Whilst this change has been exceedingly rapid from a historical perspective, it can nevertheless be divided into distinct periods, though rather arbitrarily, by some criteria such as how people travelled or how information was transferred over long distances. However these periods are defined, their lengths have become increasingly shorter, with each new technological breakthrough now taking less than ten years to become accepted (recent examples include facsimile machines, vide ...




An Overview Of Hacking
[ view this term paper ]Words: 1281 | Pages: 5

... fast-paced computerized world, knowledge is indeed power. Through the miracle of the Internet, information can be shared and accessed around the globe, instantaneously. At any given time, millions of people's credit card numbers, social security numbers, and other private data are flying through phone lines near your house. The downside to this technological marvel that we all use, whether we know it or not, is that thieves, disgruntled network administrators, and other unsavory characters can make an easy living off of the Internet, maybe even stealing from you. How? It's all in a day's work for them. One ...




An Ergonomic Evaluation Of The Kinesis Computer Keyboard
[ view this term paper ]Words: 767 | Pages: 3

... not taken into account when designing them. Fortunately, at the moment, more companies are trying to change the way people work with computer by marketing a number of ergonomic products most notably keyboard, mouse and monitor. There are ergonomic keyboards, mice and monitors being released all the time. The reason why the focus is on these products is that they are the parts of computer one interfaces with the most while working with computer. The subject of whether these ergonomic keyboards, mice, monitors and other products really work attracts a lot of regular computer users. Thus, studies dedicated to it ...




Hackers: Information Warefare
[ view this term paper ]Words: 2218 | Pages: 9

... terms I can, but in order to make my point at times I have no choice. There are many misconceptions, as to the definition, of what a hacker truly is, in all my research this is the best definition I've found: Pretend your walking down the street, the same street you have always walked down. One day, you see a big wooden or metal box with wires coming out of it sitting on the sidewalk where there had been none. Many people won't even notice. Others might say, "Oh, a box on the street.". A few might wonder what it does and then move on. The hacker, the true hacker, will see the box, stop, examine ...




Telnet
[ view this term paper ]Words: 669 | Pages: 3

... networks, whether the network being targeted for login is physically in the next room or halfway around the globe. A common program feature is the ability to emulate several diverse types of terminals-- ANSI, TTY, vt52, and more. In the early days of networking some ten to fifteen years ago, the "internet" more or less consisted of telnet, FTP (file transfer protocol), crude email programs, and news reading. Telnet made library catalogs, online services, bulletin boards, databases and other network services available to casual computer users, although not with the friendly graphic user interfaces one sees ...




Computers: Productive Tools In Our Lives
[ view this term paper ]Words: 795 | Pages: 3

... of a computer, what you need to do is get going with the program. To do that, the minimum system requirements are a C.P.U. or the central processing unit, a keyboard, a monitor, a mouse, and if you want, a printer and a CD - ROM drive. The C.P.U. is that part of a computer that faithfully does what his master tells him to do, with the help of input devices like a keyboard or a mouse. After all this so called sophisticated, next generation equipment, you need some sort of software. Software is a set of instructions to the C.P.U. from a source such as a floppy disk, a hard drive or a CD - ROM drive, in zillions o ...




Browse: « prev  9  10  11  12  13  next »

Copyright © 2024 PaperHelp. All rights reserved