Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Masters Of Deception (MoD)
[ view this term paper ]Words: 1215 | Pages: 5

... ask for. This was how Paul, a middle class boy from New York, got started with computers. Almost the same story goes for Mark, Eli, John, Julio, and Allen. These are the boys who would come to be known as the "MOD BOYS" (Masters of Deception). They were the hacker gang who dominated the hacking underworld back in the late 1980s. They all met through the phone lines. Back then there was no Internet or AOL yet people could still communicate through computers. All they needed was a modem and some phone #'s of other modems and they were in business. Paul met Eli first. They learned to hack together. After a ...




The V-Chip
[ view this term paper ]Words: 661 | Pages: 3

... in the space provided for this essay, the focus will be the technical aspects and costs of the new chip. It is impossible to generally assume that the V-chip will solve the violence problem of broadcast television or that adding this little device to every set will be a first amendment infringement. We can, however, find clues through examining the cold facts of broadcast television and the impact of a mandatory regulation on that free broadcast. "Utilizing the EIA's Recommended Practice for Line 21 Data Service(EIA-608) specification, these chips decode EDS (Extended Data Services)program ratings, compare these rati ...




Intranets
[ view this term paper ]Words: 1511 | Pages: 6

... already at hand can still be used throughout the network without conflicting with one another. Quick access and easy programming is also another consideration that is made when considering this type of network. Intranets have just started to be implemented throughout the world and already a big change is being noticed. Companies are keeping track of all of their important information on web sites, which are restricted to users, unless they have the security code to access them. Thanks to Internet technology, companies and other types of organizations are able to keep all of their information organized and e ...




Computer Security
[ view this term paper ]Words: 2495 | Pages: 10

... can be found in the memory of computer. So, people may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Noneth ...




Technology Spontaneously Approaching `Humanity' With The Passage Of Time
[ view this term paper ]Words: 2045 | Pages: 8

... state of technology gives us the ability to do “questionable things.” As we give our machines selected human characteristics to make them more efficient, they will tend to discover humanity in their own unique way, rising above their ‘specifications' to actually become human. By definition, tools are designed specifically for certain tasks, and as technological tools, the T800 and the replicant are deigned to meet specific specifications. In Terminator 2, the T800 is a multipurpose cyborg assigned to save John Connor, given a series of “mission parameters,” initially characterized by his computer logic. He ...




Classification Analysis
[ view this term paper ]Words: 565 | Pages: 3

... categories, namely output, input and CPU. The term 'output' consists of all components that display words and graphics so that a person can see them. Many people can easily understand why the monitor is a form of output device since it is the screen that tells them what the computer is actually doing. Simply put, without a monitor, the computer itself is basically useless. Another form of output, which is rarely noticed by many computer users however, is the printer. Many people have probably used a printer before, but it is just that they never realize it is also a form of output. As opposed t ...




Computer Viruses And Their Effects On Your PC
[ view this term paper ]Words: 1272 | Pages: 5

... like memory or disk space. A virus can be annoying or it can cost you lots of cold hard cash. A virus is just another name for a class of programs. They do anything that another program can. The only distinguishing characteristic is the program has ability to reproduce and infect other programs. Is a computer virus similar to a human virus? Below is a chart that will show the similarities. Comparing Biological Viruses & Human Viruses Human Virus Effects Attack specific body cells' Modify the genetic information of a cell other than previous one. It performs tasks. New viruses grow in the infected cell ...




Integration Of UMTS And B-ISDN: Is It Possible Or Desirable?
[ view this term paper ]Words: 1931 | Pages: 8

... they should work together in order to meet expected user needs. Work already taking place on this is discussed. BACKGROUND The Universal Mobile Telecommunication System (UMTS), the third generation of mobile networks, is presently being specified as part of the European RACE technology initiative. The aim of UMTS is to implement terminal mobility and personal mobility within its systems, providing a single world mobile standard. Outside Europe, UMTS is now known as International Mobile Telecommunications 2000 (IMT2000), which replaces its previous name of Future Public Land Mobile Telecommunication System (FP ...




Green Architecture
[ view this term paper ]Words: 656 | Pages: 3

... their occupants. Successfully designed green projects can involve an extensive array of factors, ranging from the resourceful use of materials, to careful consideration of function, climate, and location. The concepts about can generally be organized into several areas of application. These areas include sustainability, materials, energy efficiency, land use, and waste reduction. Green buildings are not only designed for present use, but consideration is also been given to future uses as well. An adaptable structure can be "recycled" many times over the course of its useful life. If specific technical issues pre ...




Can Machines Think On Alan Turing’s Computer Machinery And I
[ view this term paper ]Words: 780 | Pages: 3

... being given no more information than the typed answers to the questions. Specimen questions and answers are given: Q: Please write me a sonnet on the subject of the Forth Bridge. A: Count me out on this one. I never could write poetry. Q: Add 34957 to 70764. A: (Pause about 30 seconds and then give as answer) 105621.1 The interrogator addresses the players as X and Y. The challenging element to the experiment is that the man will be trying to convince the interrogator that he is in fact the woman. Turing’s motivation for creating the Imitation Game was not in line with gender issues so, to answer the qu ...




Browse: « prev  21  22  23  24  25  next »

Copyright 2024 PaperHelp. All rights reserved