Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Technology In Our Society
[ view this term paper ]Words: 833 | Pages: 4

... The central character, Ken Harrison, who becomes a quadriplegic after a car accident, has met this situation. Nevertheless, it is cruel to ask him to face this life if he does not desire to. He can no longer sculpt, run, move, kiss or have any form of sexual fulfillment. Obviously, his normal life has drifted away. The tendency to sustain people's lives, just because the technology is available, is intolerance under certain circumstances. It is the individual patient who must make a decision about whether to keep himself alive. "What is the point of prolonging a person's biological life if it is obtained at the ...




Computer Crimes
[ view this term paper ]Words: 1157 | Pages: 5

... themselves, such as credit card numbers (Bowers 54:G14). Armed with a computer rather than a gun hackers, who say they’re doing the world a favor by pointing out security loopholes, have a slew of ways to break the law (White 67:c11). Computer crime becomes a larger and more prevalent issue as there is more value to criminally gain and the stakes raise in the hacker’s ego game. Only seventy five computer crime prosecutions were reported in the United States in 1986, according to the National Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year cost ...




Computer Security And The Law
[ view this term paper ]Words: 4533 | Pages: 17

... law. The answers may very depending in which state the crime was committed and the judge who presides at the trial. Computer security law is new field, and the legal establishment has yet to reach broad agreement on may key issues. Advances in computer security law have been impeded by the reluctance on the part of lawyers and judges to grapple with the technical side of computer security issues[1]. This problem could be mitigated by involving technical computer security professional in the development of computer security law and public policy. This paper is meant to help bridge to gap between technica ...




Understanding Computers
[ view this term paper ]Words: 1491 | Pages: 6

... the rods. The abacus was also broken up into a top and bottom part, the top part had two beads and each bead in the row was assigned a value of five(of whatever place value the beads were in), and the bottom part had five beads and each bead had a value of one (same goes for these as well). As the origin is not known as to whom may have made the invention and since may ancient empires used it, some of the first to use it were the Chinese and so the credit has been given to them. Another invention that comes from the abacus and was used in a similar fashion was the soraban. The soraban comes from the Japanese wh ...




Virtual Reality
[ view this term paper ]Words: 551 | Pages: 3

... fuel in aircraft in order to learn something in an hour that could be taught in ten minutes in a simulator. Simulators have come a long way since 1929, when Ed Link first built what was soon to be known as the pilot maker, or more affectionately, the blue box. Students often find themselves sitting at the end of a runway waiting for takeoff clearance on a busy day, with the engine turning and burning expensive gas. This is not a very effective way for students to spend money. Most students do not have access to expensive flight simulators. Most have to travel hundreds of miles to take advantage of these amazin ...




Computer Crime: A Increasing Problem
[ view this term paper ]Words: 2548 | Pages: 10

... CONTROL IN THE DIGITIZED WORLD In the past decade, computer technology has expanded at an incredibly fast rate, and the information stored on these computers has been increasing even faster. The amount of money, military intelligence, and personal information stored on computers has increased far beyond expectations. Governments, the military, and the economy could not operate without the use of computers. Banks transfer trillions of dollars every day over inter-linking networks, and more than one billion pieces of electronic mail are passed through the world's networks daily. It is the age of the c ...




All About Disk Geometry And The 1024 Cylinder Limit For Disks.
[ view this term paper ]Words: 1103 | Pages: 5

... that use one disk to agree on where the partitions are.In other words, if you use both Linux and, say, DOS on one disk, then both must interpret the partition table in the same way.This has some consequences for the Linux kernel and for fdisk. Below a rather detailed description of all relevant details.Note that I used kernel version 2.0.8 source as a reference.Other versions may differ a bit. 2.Booting When the system is booted, the BIOS reads sector 0 (known as the MBR - the Master Boot Record) from the first disk (or from floppy), and jumps to the code found there - usually some bootstrap loader.These small b ...




Object-Oriented Database Management Systems
[ view this term paper ]Words: 3198 | Pages: 12

... a more general problem of all the object-oriented systems not only the database management systems. Since the data model determines the database language of the system, which in turn determines the implementation of the system, we can understand that the differences between the various systems with different data models can be big and substantial. Second is the common theoretical framework. Although there is no standard object-oriented model, most object-oriented database systems that are operational or under development today share a set of fundamental object-oriented concepts. Therefore the implementation issues in ...




Computer Pornography
[ view this term paper ]Words: 2098 | Pages: 8

... was squashed by ruling government. Today our freedom of speech is in danger again. The Government is now trying to censor what ideas go onto something we know as the Information Superhighway. The Internet is now supposed to be regulated so that it will be "safe" for everyone to enter. The Government passed a law known as the Telecommunications Act of 1996. In the TA there is a part called the Communications Decency Act or CDA. This part of the bill arose because of the recent surge of pornography on the Infobahn. The CDA criminalizes indecent speech on the Internet(Wallace: 1). The CDA describes indecent speec ...




Computer Crime 2
[ view this term paper ]Words: 2800 | Pages: 11

... rape, assault, robbery, burglary, and vehicle theft--will be brought under control in the years ahead by a combination of technology and proactive community policing. Creation of the cashless society, for example, will eliminate most of the rewards for robbers and muggers, while computer-controlled smart houses and cars will thwart burglars and auto thieves. Implanted bodily function monitors and chemical drips (such as "sober-up" drugs and synthesized hormones) will keep most of the sexually and physically violent offenders under control. But computer criminals--ranging in age from preteen to senior citizen--w ...




Browse: « prev  35  36  37  38  39  next »

Copyright © 2024 PaperHelp. All rights reserved