Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



F117 Nighthawk Stealth Fighter
[ view this term paper ]Words: 848 | Pages: 4

... maximum total weight this fighter can hold is 52,500lbs. The wingspan from side-end to side-end is 43¢ 4² and the area of one wing is 1,140 ft. squared The speed of the Nighthawk is in the high subsonic range because the cruise speed is from Mach .8 to Mach .9 and the maximum speed is Mach 1 at 36,000 ft. The range of the Nighthawk is unlimited with air refueling from another plane. The engines of the Nighthawk are two 12,500lb. General Electric F404-F1D2 non-afterburning turbofan engines with 10,600 lbs. of thrust. The Nighthawk’s armament is a non-fixed internal weapons carriage and the primary weapons ...




The Computer Underground
[ view this term paper ]Words: 15764 | Pages: 58

... paper examines the social organization of the "computer underground" (CU). The CU is composed of actors in three roles, "computer hackers," "phone phreaks," and "software pirates." These roles have frequently been ignored or confused in media and other accounts of CU activity. By utilizing a data set culled from CU channels of communication this paper provides an ethnographic account of computer underground organization. It is concluded that despite the widespread social network of the computer underground, it is organized primarily on the level of colleagues, with only small groups approaching peer rel ...




The Basics Of A Hard Drive
[ view this term paper ]Words: 569 | Pages: 3

... and off he came up with a very interesting way, he used a sheet that looked almost like a scantron sheet but with holes and those holes where used to turn it on and off. The holes represented 1s and the noholes 0s. the 1s turned it on an the 0s turned it off. With this knowledge he began to make little programs that could solve math problems. I guess he must have gotten bored with the math or something because he came up with a way to let him play tic-tack toe with the computer, which by the way was the first came ever to be created on the computer. Now there is one more thing you have to know about this computer, ...




Software Piracy And It's Effects
[ view this term paper ]Words: 1051 | Pages: 4

... and money in creating a Software and the company rely upon the sales of the Software for it's survival. If illegal copies are made of Software the companies earns no money and could therefore be forced into bankruptcy. Software Piracy can be compared to robbing as one is stealing the goods of someone else and using it without paying for it. Up to 13 Billions dollars are lost in computer piracy yearly and in order to overcome these cost the company are force to rise the prices of their product. Brand name are properties of their respected companies and they have the right to protect their properties. Understanding o ...




DVD VS. DIVX: Consumer Product Investigation
[ view this term paper ]Words: 1440 | Pages: 6

... just over a year the consumer technology DVD (Digital Versatile Disc) has made huge wages in the consumer home video market. This paper will explore the benefits of DVD as well as explore some the technical possibilities that are made available to consumers with DVD. It will also look at the latest features of DVD, DIVX (Digital Video Express) and let the reader make the decision if it's an option that is really all that necessary. DVD is a relatively new format, but it has made a huge impact in the consumer video market since it's relapse only a year ago. DVD is DVD, which stands for Digital Video Disc, Digital V ...




Ethernet
[ view this term paper ]Words: 836 | Pages: 4

... was later enhanced, and in 1985 Ethernet II was released. The IEEE's (Institute of Electrical and Electronics Engineers') Project 802 then used Ethernet Version 2 as the basis for the 802.3 CSMA/CD network standard. The IEEE 802.3 standard is generally interchangeable with Ethernet II, with the greatest difference being the construction of the network packet header. This method consists of multiple workstation that accesses a transmission medium called Multiple Access. Here the medium listen until no signals are detected. This is known as Carrier Sense. After checking to see if more than one signal is pr ...




Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?
[ view this term paper ]Words: 1288 | Pages: 5

... data encryption, and how they are being broken. Hacker /n. / 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary (Rootshell). Over the last few years, computer security has received a great deal of more attention than it has in the past. Computerized break-ins and criminal activity, have become fairly common occurrences in both commercial and academic circles. Hackers are becoming more common, and quickly learning new techniques and methods, which no longer leave ...




Microsoft
[ view this term paper ]Words: 528 | Pages: 2

... later introduced the Mouse which was a must have peripheral for all computer users today. Word was developed in September 1983 as the first Office family application. The biggest invention in was Windows, a more user-friendly and more powerful operating system than MS-DOS. formed their headquarter in Redmond, Washington, In the same year, its stock went public and started at $21 per share. The updated version of Windows operating system went on sale in 1990 and five years later the complete makeover version named Windows 95 was launched. And now the much debated and controversial program called Windows ...




Importance Of Computer Software In Education
[ view this term paper ]Words: 571 | Pages: 3

... emphasize their use in schools and secondary institutions. The proper choice of software is very important especially for beginners. Their first encounter with the computer should be exiting and fun. It should get people interested in the computing field. First and foremost is the fact that computer software is a very important educational tool. Students in high schools experience computers for the first time through games and other software. These help develop the ability to make quick and concrete decisions. The next step requires them to think more seriously about the machines. Secondary students learn ...




The Evaluation Of The Microprocessor.
[ view this term paper ]Words: 1306 | Pages: 5

... Motorola and Intel have invented most of the microprocessors over the last decade. Over the years their has been a constant battle over cutting edge technology. In the 80's Motorola won the battle, but now in the 90's it looks as Intel has won the war. The microprocessor 68000 is the original microprocessor(Encarta 95). It was invented by Motorola in the early 80's. The 68000 also had two very distinct qualities like 24-bit physical addressing and a 16-bit data bus. The original Apple Macintosh ,released in 1984, had the 8-MHz found at the core of it. It was also found in the Macintosh Plus, the original M ...




Browse: « prev  49  50  51  52  53  next »

Copyright © 2024 PaperHelp. All rights reserved