Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Data Storage Devices
[ view this term paper ]Words: 791 | Pages: 3

... Although it consumes physical space and requires proper care, non-acidic paper printouts can hold information for centuries. If long-term storage is not of prime concern, magnetic medium can retain tremendous amounts of data and consume less space than a single piece of paper. The magnetic technology used for computer data storage is the same technology used in the various forms of magnetic tape from audiocassette to videocassette recorders. One of the first computer storage devices was the magnetic tape drive. Magnetic tape is a sequential data storage medium. To read data, a tape drive must wind through the ...




Hackers
[ view this term paper ]Words: 10104 | Pages: 37

... . . . . . 57 Mutual Participation . . . . . . . . . . . . . . . 59 Pirate Groups . . . . . . . . . . . . . . . 63 Phreak/hack groups . . . . . . . . . . . . 64 Summary . . . . . . . . . . . . . . . . . . 67 Conclusion . . . . . . . . . . . . . . . . . . . . 69 REFERENCES . . . . . . . . . . . . . . . . . . . . 75 APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76 APPENDIX B. NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77 Introduction The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hacke ...




The Internet Contributes To The Process Of Globalization
[ view this term paper ]Words: 895 | Pages: 4

... to be a refuge for diversity and will actually foster a demand for difference. Globalization theory hypothesizes the convergence of all the worlds institutions, thus creating emancipatory markets and an informal, non state, non economic, political zone. The increasing prominence of the Internet in the day to day lives of people across the globe and the growing reliance on information disseminated via the Internet illustrates the ability of the Internet to span the globe and in essence create a unified sense of shared memories. Furthermore it is immutable proof that the Internet is perhaps the most powerful tool ...




Windows 95 Or NT
[ view this term paper ]Words: 684 | Pages: 3

... two of the most debated systems available to the general public in this day and age. However, in doing so each one of these operating systems has there good side and there bad side. Windows NT 3.51 was originally created for business use, but has ended up being more widely available for the average PC user in ones home. Windows 95 was developed for the sole purpose as an alternative to Windows NT. But has ended up in the work place more then the home. Windows 95 carries an average price of ninety-five dollars in stores. Which makes it an expensive system worth the money. On the other hand Windows NT 3.51 carr ...




New Eye Tracking Techniques Improve Realism Of Aircraft Simulators
[ view this term paper ]Words: 458 | Pages: 2

... throughout the whole viewed scene. However, based on the visual properties of the eye, realism can be obtained by providing a high-resolution 'area of interest' insert within a large, low-resolution field of view. If the image-generating computer 'knows' where the pilot's fixation is, it mage there. The technology to make this possible was developed by a research team headed by Professor Richard Frecker and Professor Moshe Eizenman. The work was carried out in collaboration with CAE Electronics Ltd. of Montreal with financial support from the Natural Sciences and Engineering Research Council of Canada. ...




What Really Is A Hacker?
[ view this term paper ]Words: 409 | Pages: 2

... hacker. The first, which is universally agreed upon is that access to computers should be free and unlimited. This is not meant to be a invasion of privacy issue, but rather free use of all computers and what they have to offer. They also believe that anyone should be able to use all of a computers resource with no restrictions as to what may be accessed or viewed. This belief is controversial, it not only could infringe upon people's right to privacy, but give up trade secrets as well. A deep mistrust of authority, some hackers consider authority to be a constriction force. Not all hackers believe in this ethic ...




A Cray SuperComputer Comes To The University Of Toronto
[ view this term paper ]Words: 680 | Pages: 3

... at a clock rate of 105 MHz (the regular, run-of-the-mill IBMPC has a clock rate of 4.77 MHz). By quick calculations, you would be led to believe the Cray is only about 20 times faster that the PC. Obviously, this is not the case. The Cray handles data considerably differently than the PC. The Cray's circuits permit an array of data (known as a 'vector') to be processes as a SINGLE entity. So, where the IBMPC may require several clock cycles to multiply two numbers, the Cray performs everything in one clock cycle. This power is measured in Millions of Floating Point Operations Per Second (MFLOPS) - which is to say ...




Software Piracy
[ view this term paper ]Words: 1389 | Pages: 6

... as much as $7.5 billion of American software may be illegally copied and distributed annually worldwide. These copies work as well as the originals and sell for significantly less money. Piracy is relatively easy, and only the largest rings of distributors are usually caught. In addition, software pirates know that they are unlikely to serve hard jail time when prisons are overcrowded with people convicted of more serious crimes. The software industry loses more than $15.2 billion annually worldwide due to software piracy. Software piracy costs the industry: $482 every sec ...




Computer Programming
[ view this term paper ]Words: 880 | Pages: 4

... needs. They may also work for a large computer corporation developing new software and/or improving older versions of these programs. Programmers write specific programs by breaking down each step into a logical series of hours of writing programs, the programmer must follow. After long hours of writing programs, the programmer must thoroughly testing and revising it. Generally, programmers create software by using the following a basic step-by-step development process: (1) Define the scope of the program by outlining exactly what the program will do. (2) Plan the sequence of computer ope ...




Computer Viruses
[ view this term paper ]Words: 1753 | Pages: 7

... suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country’s moral and ethical trust in the information age. Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defens ...




Browse: « prev  30  31  32  33  34  next »

Copyright © 2024 PaperHelp. All rights reserved