Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection
[ view this term paper ]Words: 548 | Pages: 2

... by software manufacturers) are loaded, and used in a previously uninfected system thus allowing the virus to spread. 2. Local Area Network: a LAN allows multiple computers to share the same data, and programs. However, this data sharing can allow a virus to spread rapidly to computers that have otherwise been protected from external contamination. 3. Telecommunications: also known as a Wide Area Network, this entails the connection of computer systems to each other via modems, and telephone lines. This is the vector most feared ...




Machines: Are They Helpful Or Too Much Trouble?
[ view this term paper ]Words: 485 | Pages: 2

... light bulbs gave light at night and when rain was falling. As people needed employment, they traveled to London to find work, which caused the population to increase. Developers built multi story building(apartments), and row houses making streets less crowded, and gave the people a newfound wealth and security. Steam engines made it easy to transport goods, the cotton gin made it easier to clean cotton, and made more money. Then technical schools began to develop, helping young people finish grammar school. Women also started working, they were very obedient and men started giving them more respect. Along wit ...




HDTV
[ view this term paper ]Words: 688 | Pages: 3

... . This committee was established to insure order in the development process within the industry that would be accepted by the FCC. This standard was created in the 40's and 50's. Each receiver sold to the American public must conform to received the NTSC signal. This signal has proved to be a durable way of transmitting information for 50 years. But with today's technology, a new standard has been in the works, HDTV. In September 1992 NBC's WRC-TV in Washington DC became the first television station in the country to send HDTV signals over the air waves. WRC- TV's general manager then stated, "With advanc ...




Computer Crimes
[ view this term paper ]Words: 1152 | Pages: 5

... about themselves, such as credit card numbers (Parker 54:G14). Armed with a computer rather than a gun hacker, who say they’re doing the world a favor by pointing out security loopholes, have a slew of ways to break the law (Frog 67:C11). Computer crime becomes a larger and more prevalent issue, as there is more value to criminally gain and the stakes raise in the hacker’s ego game. Only seventy-five computer crime prosecutions were reported in the United States in 1986, according to the National Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year c ...




Censorship
[ view this term paper ]Words: 1192 | Pages: 5

... do harm to individuals in its audiences or to society as a whole. "Obscene material is attacked because of the fear that it will corrupt personal morality" (Grolier, Inc.). The first amendment states that Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. In no way does violate the first amendment. prevents broadcasters from infringing on the rights of the viewers. has really been limited to ...




Information About Viruses
[ view this term paper ]Words: 326 | Pages: 2

... a disk that is infected with a virus is used to boot the computer. When this computer is infected, every one who writes a floppy disk on this computer gets their floppy disk contaminated, and risks getting this virus on their computer, which may not have good virus protection. On IBM-Compatible PCs, viruses will only infect executable programs, such as the .EXE and .COM files. On a Macintosh, any file can be contaminated. A disk can also be infected even without any files on it. These viruses are called BOOT SECTOR viruses. These viruses reside on the part of the floppy disk, or hard disk that store the information ...




Freedom Of Speech & Censorship On The Internet
[ view this term paper ]Words: 2293 | Pages: 9

... alt.binaries.pictures.* which has sexually explicit pictures. Towson State has also included a warning on their home page that there may be pornographic material on the Internet. Pornographic material is not the only material to be found on the net which can raise questions of censorship and control: discussion of racial, political, religious and sexual topics all run the risk of offending someone, somewhere, leading to demands for control of the Internet. The question of censorship may also be raised in some unexpected places: one newsgroup is the rec.humor list, which is a collection of jokes submitted to subscribe ...




Government Intervention Of The Internet
[ view this term paper ]Words: 2350 | Pages: 9

... the knowledge society. At present, this net is the epitome of the first amendment: free speech. It is a place where people can speak their mind without being reprimanded for what they say, or how they choose to say it. The key to the world-wide success of the Internet is its protection of free speech, not only in America, but in other countries where free speech is not protected by a constitution. To be found on the Internet is a huge collection of obscene graphics, Anarchists' cookbooks and countless other things that offend some people. With over 30 million Internet users in the U.S. alone (only 3 million o ...




Privacy And The Internet
[ view this term paper ]Words: 4771 | Pages: 18

... its regulation. A problem arises whenever a new medium of communication forms. The question of privacy began when man uttered his first words. The question was raised again when the postal system began and then when telephones were introduced. Once again, we must apply the question to the new information superhighway, that is e-mail, telecommuting, online newsgroups, etc. The question is this: What does privacy on the internet mean? Privacy And The Internet Introduction According to Bill Eager, "The Information Superhighway refers to the multitude of technologies and businesses that encompass the eletronic dis ...




Battle Of The Bytes: Macintosh Vs. Windows 95
[ view this term paper ]Words: 1131 | Pages: 5

... of course over DOS, but it still didn't compete against the ease of use on a Mac. The Windows 95 interface is much better than Windows 3.x. It borrows some from the Macintosh interface and has improved on it. Some improvements are the ability to work with folder icons that represent directories and subdirectories in DOS. Windows 95, unlike the Mac, logically groups data and resources. A Taskbar menu lets you call up and switch between any software application at any time. Thus feature is better than the Mac's because its use is more obvious. It clearly shows what is running and allows you to switch programs with ...




Browse: « prev  47  48  49  50  51  next »

Copyright © 2024 PaperHelp. All rights reserved