Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Viruses
[ view this term paper ]Words: 3001 | Pages: 11

... numbers any generating tones or carriers are recorded. These numbers are looked at by hackers and then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and ...




Electronics
[ view this term paper ]Words: 500 | Pages: 2

... in the business world today. Business people rely on electronics to communicate with each other faster and to store and quickly organize vast amounts of essential data. Electronics are improving at a blindingly fast rate. The newest technology from five years ago is literally obsolete today. Electronics are also being used for new purposes continuously. The Internet, or World Wide Web, is a relatively new concept of being “on-line”. This new project has opened a limitless number of doors for our society. Now anyone can use the Internet to communicate with anybody else in the world a lot faster and che ...




Smart Car Technology
[ view this term paper ]Words: 1119 | Pages: 5

... the so called "touch screen". 7000 buisnesses in the area are already listed in the computer, and you can point out your destination by searching through a lot of menus until you find it, or simply by typing the name of the street. when the place you want to go are registered you push the make destination button, and the computer programmes a route, the second after the route appears on the screen, while a voice explains it to you through the loudspeaker. c: The TravTek guides the driver through the traffic. The computer always knows where you are, and the navigation system makes it impossible to get lost in ...




The Y2k Issue
[ view this term paper ]Words: 1450 | Pages: 6

... failures of critical infrastructure components. Some power plants are going to be shut down. Some water treatment facilities will fail. Some banks will experience bank runs, and some telecommunications centers will be out cold. In addition transportation, hospitals, and food delivery will also be jeopardized. This does not mean that all of these will experience problems, or even that a majority will. But without question, some will. The extent of that "some" is largely unknown. Water treatment facilities, food & farming, defense, transportation, hospitals & emergency service, power, banking, law enforcement, ...




Improving Cyberspace
[ view this term paper ]Words: 2068 | Pages: 8

... 1. All sites in America receive their address from the government. 2. The government could destroy the address for inappropriate material. 3. Existing federal laws regulate BBS's from inappropriate material. III. Censoring the Internet would establish moral standards. A. Pornography online is more harsh than any other media. 1. The material out there is highly perverse and sickening. 2. Some is not only illegal, but focuses on children. ...




History Of The Computer Industry In America
[ view this term paper ]Words: 2604 | Pages: 10

... The earliest existence of the modern day computer ancestor is the abacus. These date back to almost 2000 years ago. It is simply a wooden rack holding parallel wire on which beads are strung. When these beads are moved along the wire according to "programming" rules that the user must memorize, all ordinary arithmetic operations can be performed (Soma, 14). The next innovation in computers took place in 1694 when Blaise Pascal invented the first digital calculating machine. It could only add numbers and they had to be entered by turning dials. It was designed to help Pascal's father who was a tax collec ...




The Internet: How It Works And How It Effects The World
[ view this term paper ]Words: 1622 | Pages: 6

... links. Fortunately, the Net is not usually under enemy attack. The ARPANET was very successful, and every university in the country wanted to sign up. Because so many people wanted to use the Net, ARPANET started getting hard to manage, especially with many university sites on it. Therefore, it was broken into two parts: MILNET, which had all the military sites, and ARPANET, which had all the nonmilitary sites. "The two networks remained connected, however, thanks to a technical scheme called IP (Internet Protocol), which enabled traffic to be routed from one net to another as needed. All the networks connected ...




Computer Viruses: Past, Present And Future
[ view this term paper ]Words: 4592 | Pages: 17

... to computer viruses. · A history of computer viruses · Who writes viruses - and how they can reach you · The early warning symptoms of virus infection · The real numbers behind the growth of viruses and their costs · How viruses work - and how virus protection can stop them What, Exactly, Is A Computer Virus? A computer virus is a program designed to replicate and spread, generally with the victim being oblivious to its existence. Computer viruses spread by attaching themselves to other programs (e.g., word processors or spreadsheets application files) or to the boot sector of a disk. When an infected file ...




Protocols And Interfaces
[ view this term paper ]Words: 604 | Pages: 3

... connection. Except for wireless LANs, which are not discussed here, it is uncommon to use a bridge between a wireless network and a fixed-en d network. Our profiles of specific networks further below explain what specific protocols are used. But the general pattern for the wireless link is as follows. Physical layer An RF carrier signal that is digitally modulated to create a bit stream. This bit stream incorporates forward error correction, interleaving and other techniques to mitigate the effects of interference and weak signals that can produce high-bit-error rates. Link layer Usually a specialized radio ...




Telecommuting
[ view this term paper ]Words: 1086 | Pages: 4

... result in a positive manner. When an employee has a high readiness level and a definite desire to attempt working in the home, for some reason or another, many factors should be considered. What kind of schedule does the employee feel constitutes telecommuting? Generally speaking, telecommuting is defined as spending at least one day out of a five day work week working in the home. Is one day home enough for the employee? Or, too little? How does the employer decide how many days to allow? Does the employee's job lend itself well to telecommuting? Some jobs, obviously, can't be accomplished using a telecommut ...




Browse: « prev  14  15  16  17  18  next »

Copyright 2024 PaperHelp. All rights reserved