Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Computer Integrated Manufacturing
[ view this term paper ]Words: 1569 | Pages: 6

... is Computer-Integrated Manufacturing? Utilizing the computer to integrate the fragmented operations of manufacturing into a single, smoothly operating, manufacturing system with reduced total manufacturing costs and turnaround times, and improved quality is generally termed Computer-Integrated Manufacturing (CIM). Another definition that is more precise might be the utilization of computers to control the integration and flow of information between design, engineering, manufacturing, logistics, warehousing and distribution, customers and suppliers, sales and marketing activities, financial management and the overall ...




Computer Crime In The 90's
[ view this term paper ]Words: 1554 | Pages: 6

... dials numbers any generating tones or carriers are recorded. These numbers are looked at by hackers and then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, a ...




The Y2K Problem
[ view this term paper ]Words: 4210 | Pages: 16

... used. Hindsight is always 20/20 however, and this was almost never the case. Regardless where you address the problem from, the year 2000 problem is a huge, expensive and international one. In many cases it is a problem lined with doubt as to it's effects. This paper will analyze the various aspects to the year 2000 problem, classical and software solutions to the problem, and present the author's ideas on how a systematic approach to the "millennia virus" can prevent doomsday from becoming a reality for many information technology managers and their corporations. What, specifically, _is_ this "millennia virus" t ...




Airplanes
[ view this term paper ]Words: 1727 | Pages: 7

... usually has a small baggage compartment and may include additional seats for passengers. When air flows around the wings of an airplane, it generates a force called "lift" that helps the airplane fly. Wings are contoured to take maximum advantage of this force. Wings may be attached at the top, middle, or lower portion of the fuselage. These designs are referred to as high-, mid-, and low-wing, respectively. The number of wings can also vary. Airplanes with a single set of wings are referred to as monoplanes, while those with two sets are called biplanes. To help fly the airplane, the wings have ...




Production Planning
[ view this term paper ]Words: 2089 | Pages: 8

... management the plant still might be running. Modern production management or operation management (OM) systems first came to prominence in the early half of the twentieth century. Frederick W. Taylor is considered the father of operations management and is credited in the development of the following principles. a. Scientific laws govern how much a worker can produce in a day. b. It is the function of management to discover and use these laws in operation of productive systems. c. It is the function of the worker to carry out management's wishes without question. Many of today's method's of operatio ...




The Arrival Of Email
[ view this term paper ]Words: 439 | Pages: 2

... letters and tape recorded conversations-for example President Nixon's Watergate related tapes-that have sometimes been used by external parties to take companies to task in court. With the digital communication methods of the Information Age, organizational managers are finding that E-mail archives and files are telling sources of information about an organization's policies and actions. In the antitrust case against Microsoft "E-mail messages dashed off years ago by the Microsoft Corp. chairman and his top lieutenants now figure prominently as digital "smoking guns" . . . Trustbusters say electronic messages, ...




The Motor And How It Works
[ view this term paper ]Words: 346 | Pages: 2

... and the coils are the same on both sides of the motor. I also know that the fields are opposite because the current travels through solenoid 1 in an opposite direction of solenoid 4. The parts that make the motor spin are solenoids 2 and 3. When the current travels through the motor, it goes through the two metal pieces that send the current into whichever solenoid is touching it (solenoid 2 or 3). When part 5 spins, the direction of the current through 2 and 3 are reversed every time the motor spins half way around. The metal pieces touch the solenoids in just the right places to give solenoids 2 and 3 a ma ...




Virtual Reality Technology And Society
[ view this term paper ]Words: 1638 | Pages: 6

... 3 Audio Output Devices. . . . . . . . . . . . . . . . . . . . . . . . 4 Tactile Response Devices. . . . . . . . . . . . . . . . . . . . . . 5 Interactive Input Devices . . . . . . . . . . . . . . . . . . . . . 5 Computers and Software. . . . . . . . . . . . . . . . . . . . . . . 6 THE HISTORY OF VIRTUAL REALITY . . . . . . . . . . . . . . . . . . . . . 7 Virtual Reality in the Past . . . . . . . . . . . . . . . . . . . . 7 Virtual Reality in the Present. . . . . . . . . . . . . . . . . . . 9 Virtual Reality in the Future . . . . . . . . . . . . . . . . . . . 10 THE SOCIAL IMP ...




Computer Crime Is Increasing
[ view this term paper ]Words: 1410 | Pages: 6

... electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators' accounts for withdrawal. Computers are instruments of crime when they are used to plan or control such criminal acts. Examples of these types of crimes are complex embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal or alter valuable information from an employer. Variety and Extent Since the first cases were reported in 1958, computers have been used for most kinds of crime, including fraud, theft, embezzlement, bur ...




Parity/Non-parity Check
[ view this term paper ]Words: 236 | Pages: 1

... this from happening, a parity check system was developed. Each character is represented by a byte consisting of a combination of intelligence bits (seven bits in ASCII and eight bits in EBCDIC) and an additional bit called a check or parity bit. Even parity codes place a check bit with each byte that contains an uneven number of 1 bits. (Remember that a bit is either 1 or o). Because the check bit is transmitted only with characters composed of an uneven number of 1 bits,all characters transmitted will have n even number of 1 bits. The check bit is transmitted to and from the computer along with character ...




Browse: « prev  29  30  31  32  33  next »

Copyright © 2024 PaperHelp. All rights reserved